the university often sharing the data with the her providers the services and the projects. While the general rule from education records cannot be disclosed a anyone. In this paper we proposed hyperledger fabric in s...
详细信息
the university often sharing the data with the her providers the services and the projects. While the general rule from education records cannot be disclosed a anyone. In this paper we proposed hyperledger fabric in same university for connected all faculty and knowledge sharing with we use the InterPlanetary File System (IPFS) for the storage of tendering document. (c) 2023 The Authors. Published by Elsevier B.V.
The technique of image steganography is the embedding of secret information into the carrier image by means of algorithms that are widely used in the field of information transmission, but steganalysis tools built wit...
详细信息
Traditional recommendation systems typically rely solely on user content information to predict product ratings while ignoring the impact of other factors on recommendation effectiveness. Proposes a recommendation alg...
详细信息
With the rapid development of smart grid technology, a new challenge has been brought about by the massive data generated from distributed devices. data aggregation technology plays a crucial role in smart grid scheme...
详细信息
In this paper, I will be discussing quantum computing in cybersecurity. Quantum computing is in development and will be released to the public sooner rather than later. With how quickly technology evolves, it will get...
详细信息
ISBN:
(数字)9798350361513
ISBN:
(纸本)9798350361513;9798350372304
In this paper, I will be discussing quantum computing in cybersecurity. Quantum computing is in development and will be released to the public sooner rather than later. With how quickly technology evolves, it will get here faster than we know it. However, this opens the door for cyberattacks with strength never seen before, possibly breaching the privacy of millions of individuals and organizations around the world. I have gathered information and data surrounding the involvement of cybersecurity within the quantum computing world. This research involves how this type of computing is being utilized with cybersecurity today, possible risks of both the security and the introduction of computers with exponential computing power compared to current devices, along with what encryption methods are strong enough to hold firm against quantum powered attacks. Technology is the future humanity has made for themselves, and understanding the security risks and benefits are critical to remaining safe and ethical while new techniques emerge.
With the rapid development of social economy, science and technology, e-commerce and network, computer extends more and more content, in the era of big data, cloud computing has become an emerging field, multi-tenant,...
详细信息
Cryptographic functions with low differential uniformity have wide applications in cryptography and cyber security. In this paper, we further investigate c-differential uniformity proposed by Ellingsen et al. (IEEE Tr...
详细信息
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy lea...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
As the most common technique for mining and analyzing massive data, frequent itemset mining is widely used in various scenarios. However, when the data contains sensitive information, it will bring serious privacy leakage risks to mining and publishing it directly. Therefore, how to efficiently mine frequent itemset without privacy disclosure is a hot issue at present. In data stream, because the data between adjacent timestamps possess certain correlation, which makes it easier to leak privacy for frequent itemset mining in the data stream, and considering that frequent itemset will have combinatorial explosion problem in data stream, frequent closed itemset mining in the data stream will be a better choice. In this paper, we propose a differential privacy algorithm for mining frequent closed itemset in data stream, which is referred to as DPES. The algorithm uses a vertical mining method in each sliding window, which can quickly obtain the frequent closed itemset contained in the current window. Besides, to improve the data utility, we also design an adaptive privacy budget allocation strategy by computing the difference to decide whether the current timestamp should publish a low-noise statistic or an approximate statistic. Finally, we demonstrate that the DPES algorithm satisfies e-difference privacy by privacy analysis, and the experimental results on several real datasets also show the effectiveness of the DPES algorithm.
In this paper, we study the problem of classification of data in a spatial data stream. The classification of spatial objects in a static data set has been well studied. However, classifying objects in a spatial data ...
详细信息
In this paper, we study the problem of classification of data in a spatial data stream. The classification of spatial objects in a static data set has been well studied. However, classifying objects in a spatial data stream has received very little attention. We propose an iterative ensemble approach for deep learning of a spatial data stream. Using several deep neural networks, our strategy iteratively performs training and testing of the classifier, with the goal of reaching a desired accuracy, and the same accuracy that would be achieved as a classifier that is trained and tested with the entire dataset. An experimental evaluation and comparison of the ensemble approach shows improvement over a previously proposed iterative deep learning strategy. (c) 2023 The Authors. Published by Elsevier B.V.
As the number of connected devices increases, protecting sensitive information transmitted by IoT devices is critical. One of the most effective ways to ensure data confidentiality while accommodating the limited reso...
详细信息
暂无评论