In today's computing era, fog computing has emerged as a transformative paradigm, facilitating real-time data processing at the network edge to reduce latency and enhance responsiveness. However, ensuring optimal ...
详细信息
Image inpainting is the process of completing or reconstructing areas in an image that are absent or damaged using information extracted from the surrounding parts of the same image. The output inpainted images should...
详细信息
Image exploration adopts several dimensionalities with web-based tasks, integrating Streamlit and OpenCV to create an interactive platform for advanced image enhancement. Alongside the transformative tool enabling con...
详细信息
Crop pests are a major problem for farmers in agriculture, as they can significantly reduce both yield and quality, thereby affecting global food security and economic stability. In this study, we proposed a solution ...
详细信息
The rising complexity of cyberthreats created the demand for compelling cybersecurity solutions that along with expanding Internet of Things (IoT) devices has made them indispensable. In the work our proposal is a Dee...
详细信息
Flying Ad hoc Networks are becoming highly appealing due to their versatile applications in domains like surveillance, search and rescue, environmental monitoring, and communication relays, offering significant societ...
详细信息
The healthcare sector is currently a major focal point globally, given the rising prevalence of health issues. Managing rural healthcare poses a significant challenge in India, where treating the diseases with early d...
详细信息
In the rapidly evolving landscape of healthcare, technological advancements play a pivotal role in enhancing patient care and optimizing medical services. New solutions are being developed and implemented, both those ...
详细信息
Machine Learning is one of the most popular advancements in technology which is being widely used in various domains, including healthcare, avionics, automotive, business, education, etc. A Machine learning approach w...
详细信息
ISBN:
(纸本)9798350381689
Machine Learning is one of the most popular advancements in technology which is being widely used in various domains, including healthcare, avionics, automotive, business, education, etc. A Machine learning approach works by learning the required knowledge from the data to be supplied by a client system. In a typical scenario, a client entrusts a third-party agency to develop a machine learning application and shares the data to the developer to enable the development of a Machine learning application. This is badly affecting the privacy of data as a third-party is getting access to sensitive data from a client system. Therefore, an effective data encoding technique is required to ensure the privacy of sensitive data while enabling a third-party agency to develop a Machine learning application on the encoded data. Existing data masking/encoding techniques such as pseudonymization, anonymization and substitution are badly affecting the machine learning process as the modification they do for masking data is preventing a machine learning approach to learn the required knowledge. Another approach known in the literature is Fully Homomorphic Encryption. But, there is no tool available based on this technique which enables a client system to mask sensitive data before giving it to a third-party Machine Learning developer. We failed to obtain the expected outcome from an off-the-shelf Machine Learning classifier when we tried to classify a benchmark dataset masked using an available implementation of Fully Homomorphic Encryption. Since enough details about the implementation is not available, we could not find and fix the issues which is causing this problem. We propose a technique based on which we implemented a tool which provides an easy-to-use Graphical User Interface enabling the client to mask sensitive data before giving it to a third-party agency for developing a Machine Learning Application. Our tool enables a client to mask sensitive data through few mouse click
The proposed work addresses the escalating concern of crimes against women in contemporary society. This comprehensive endeavor employs a data-driven approach to tackle this critical issue. The primary objectives enco...
详细信息
暂无评论