|
|
|
Olga Kurasova, Arnoldas Bud?ys and Viktor Medvedev
As artificial intelligence has evolved, deep learning models have become important in extracting and interpreting complex patterns from raw multidimensional data. These models produce multidimensional embeddings that, while containing a lot of informatio...
ver más
|
|
|
|
|
|
|
AlsharifHasan Mohamad Aburbeian and Manuel Fernández-Veiga
Securing online financial transactions has become a critical concern in an era where financial services are becoming more and more digital. The transition to digital platforms for conducting daily transactions exposed customers to possible risks from cyb...
ver más
|
|
|
|
|
|
|
Shunfang Hu, Shaoping Jiang, Qing Miao, Fan Yang, Weihong Zhou and Peng Duan
With the rise of the Internet of Things (IoT), maintaining data confidentiality and protecting user privacy have become increasingly challenging. End devices in the IoT are often deployed in unattended environments and connected to open networks, making ...
ver más
|
|
|
|
|
|
|
Shengyang Li, Zhen Wang and Wanfeng Zhang
Cloud computing has become one of the key technologies used for big data processing and analytics. User management on cloud platforms is a growing challenge as the number of users and the complexity of systems increase. In light of the user-management sy...
ver más
|
|
|
|
|
|
|
Jiawei Han, Qingsa Li, Ying Xu, Yan Zhu and Bingxin Wu
Artificial intelligence-generated content (AIGC) technology has had disruptive results in AI, representing a new trend in research and application and promoting a new era of AI. The potential benefits of this technology are both profound and diverse. How...
ver más
|
|
|
|
|
|
|
Maria Louro da Silva, Carolina Gouveia, Daniel Filipe Albuquerque and Hugo Plácido da Silva
Bio-Radar (BR) systems have shown great promise for biometric applications. Conventional methods can be forged, or fooled. Even alternative methods intrinsic to the user, such as the Electrocardiogram (ECG), present drawbacks as they require contact with...
ver más
|
|
|
|
|
|
|
Yajie Wang, Xiaomei Zhang and Haomin Hu
Recent developments in the mobile and intelligence industry have led to an explosion in the use of multiple smart devices such as smartphones, tablets, smart bracelets, etc. To achieve lasting security after initial authentication, many studies have been...
ver más
|
|
|
|
|
|
|
Ioanna Anastasaki, George Drosatos, George Pavlidis and Konstantinos Rantos
Immersive technologies are revolutionary technological advancements that offer users unparalleled experiences of immersion in a virtual or mixed world of virtual and real elements. In such technology, user privacy, security, and anonymity are paramount, ...
ver más
|
|
|
|
|
|
|
Soumya Prakash Otta, Subhrakanta Panda, Maanak Gupta and Chittaranjan Hota
The unauthorized usage of various services and resources in cloud computing is something that must be protected against. Authentication and access control are the most significant concerns in cloud computing. Several researchers in this field suggest num...
ver más
|
|
|
|
|
|
|
Bithin Alangot, Pawel Szalachowski, Tien Tuan Anh Dinh, Souhail Meftah, Jeff Ivanos Gana, Khin Mi Mi Aung and Zengpeng Li
Decentralized identity (DID) systems aim to give users full control over their identities by using completely decentralized technologies, such as blockchain or distributed ledgers, as identity providers. However, when user credentials are compromised, it...
ver más
|
|
|
|