Named in-network computing service (NICS) is a potential computing paradigm emerged recently. Benefitted from the characteristics of named addressing and routing, NICS can be flexibly deployed on NDN router side and p...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Subspace clustering has shown great potential in discovering the hidden low-dimensional subspace structures in high-dimensional data. However, most existing methods still face the problem of noise distortion and overl...
详细信息
Purpose-The Internet of Things(IoT)cloud platforms provide end-to-end solutions that integrate various capabilities such as application development,device and connectivity management,data storage,data analysis and dat...
详细信息
Purpose-The Internet of Things(IoT)cloud platforms provide end-to-end solutions that integrate various capabilities such as application development,device and connectivity management,data storage,data analysis and data *** high use of these platforms results in their huge availability provided by different ***,choosing the optimal IoT cloud platform to develop IoT applications successfully has become *** key purpose of the present study is to implement a hybrid multi-attribute decision-making approach(MADM)to evaluate and select IoT cloud ***/methodology/approach-The optimal selection of the IoT cloud platforms seems to be dependent on multiple ***,the optimal selection of IoT cloud platforms problem is modeled as a MADM problem,and a hybrid approach named neutrosophic fuzzy set-Euclidean taxicab distance-based approach(NFS-ETDBA)is implemented to solve the ***-ETDBA works on the calculation of assessment score for each alternative,*** cloud platforms,by combining two different measures:Euclidean and taxicab ***-A case study to illustrate the working of the proposed NFS-ETDBA for optimal selection of IoT cloud platforms is *** results obtained on the basis of calculated assessment scores depict that“Azure IoT suite”is the most preferable IoT cloud platform,whereas“Salesman IoT cloud”is the least ***/value-The proposed NFS-ETDBA methodology for the IoT cloud platform selection is implemented for the first time in this *** is highly capable of handling the large number of alternatives and the selection attributes involved in any decision-making ***,the use of fuzzy set theory(FST)makes it very easy to handle the impreciseness that may occur during the data collection through a questionnaire from a group of experts.
作者:
Manjunatha, A.S.Venkatramana Bhat, P.
Department of Computer and Communication Engineering India
Department of Computer Science and Engineering India
Data is collected and forwarded to the cluster head by sensor nodes in the Wireless Sensor Network (WSN). Ensuring the confidentiality and integrity of the data that must be provided to the base station is tough. We r...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
Link prediction in complex networks is a fundamental problem with applications in diverse domains, from social networks to biological systems. Traditional approaches often struggle to capture intricate relationships i...
详细信息
In this paper, the computation of graph Fourier transform centrality (GFTC) of complex network using graph filter is presented. For conventional computation method, it needs to use the non-sparse transform matrix of g...
详细信息
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by t...
详细信息
The overgeneralisation may happen because most studies on data publishing for multiple sensitive attributes(SAs)have not considered the personalised privacy ***,sensitive information disclosure may also be caused by these personalised *** address the matter,this article develops a personalised data publishing method for multiple *** to the requirements of individuals,the new method partitions SAs values into two categories:private values and public values,and breaks the association between them for privacy *** the private values,this paper takes the process of anonymisation,while the public values are released without this *** algorithm is designed to achieve the privacy mode,where the selectivity is determined by the sensitive value frequency and undesirable *** experimental results show that the proposed method can provide more information utility when compared with previous *** theoretic analyses and experiments also indicate that the privacy can be guaranteed even though the public values are known to an *** overgeneralisation and privacy breach caused by the personalised requirement can be avoided by the new method.
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
暂无评论