|
|
|
Alya Alshammari and Khalil El Hindi
The combination of collaborative deep learning and Cyber-Physical Systems (CPSs) has the potential to improve decision-making, adaptability, and efficiency in dynamic and distributed environments. However, it brings privacy, communication, and resource r...
ver más
|
|
|
|
|
|
|
Kasun Moolikagedara, Minh Nguyen, Weiqi Yan and Xuejun Li
In the digital age, where the Internet of Things (IoT) permeates every facet of our lives, the safeguarding of data privacy, especially video data, emerges as a paramount concern. The ubiquity of IoT devices, capable of capturing and disseminating vast q...
ver más
|
|
|
|
|
|
|
Azizah Assiri and Hassen Sallay
Opportunistic mobile social networks (OMSNs) have become increasingly popular in recent years due to the rise of social media and smartphones. However, message forwarding and sharing social information through intermediary nodes on OMSNs raises privacy c...
ver más
|
|
|
|
|
|
|
Zeming Wei, Jiawen Fang, Zhicheng Hong, Yu Zhou, Shansi Ma, Junlang Zhang, Chufeng Liang, Gansen Zhao and Hua Tang
Blockchain is a distributed ledger technology that possesses characteristics such as decentralization, tamper resistance, and programmability. However, while blockchain ensures transaction openness and transparency, transaction privacy is also at risk of...
ver más
|
|
|
|
|
|
|
Pankaj Khatiwada, Bian Yang, Jia-Chun Lin, Godfrey Mugurusi and Stian Underbekken
Internet of Things (IoT) devices have changed how billions of people in the world connect and interact with each other. But, as more people use IoT devices, many questions arise about how these devices handle private data and whether they properly ask fo...
ver más
|
|
|
|
|
|
|
Ali Eghmazi, Mohammadhossein Ataei, René Jr Landry and Guy Chevrette
The Internet of Things (IoT) is a technology that can connect billions of devices or ?things? to other devices (machine to machine) or even to people via an existing infrastructure. IoT applications in real-world scenarios include smart cities, smart hou...
ver más
|
|
|
|
|
|
|
Yan Wang, Fei Ji, Quansheng Guan, Hao Zhao, Kexing Yao and Weiqi Chen
Due to the space?time coupling access, we find that anti-eavesdropping opportunities exist in underwater acoustic networks (UANs), where packets can be successfully received only by the intended receiver, but collide at the unintended receivers. These op...
ver más
|
|
|
|
|
|
|
Xingchen Wang and Peng Li
With the widespread adoption of cloud computing, the face verification process often requires the client to upload the face to an untrusted cloud server to obtain the verification results. Privacy leakage issues may arise if the client?s private informat...
ver más
|
|
|
|
|
|
|
Christian Bonnici West and Simon Grima
The richness and complexity of consent present challenges to those aiming to make related contributions to computer information systems (CIS). This paper aims to support consent-related research in CIS by simplifying the understanding of existing literat...
ver más
|
|
|
|
|
|
|
Jun Li, Chenyang Zhang, Jianyi Zhang and Yanhua Shao
To address the challenge of balancing privacy protection with regulatory oversight in blockchain transactions, we propose a regulatable privacy protection scheme for blockchain transactions. Our scheme utilizes probabilistic public-key encryption to obsc...
ver más
|
|
|
|