Meta-heuristic optimization algorithms have become widely used due to their outstanding features, such as gradient-free mechanisms, high flexibility, and great potential for avoiding local optimal solutions. This rese...
详细信息
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable...
详细信息
The Internet of Things (IoT) is a rapidly growing network of devices that can communicate with each other and with cloud-based services. These devices generate vast amounts of data that can be used to provide valuable insights into user behavior, environmental conditions, and other important factors. However, as this data is collected and processed by cloud-hosted services, there is a growing concern about privacy and security. Without adequate protection, sensitive information could be exposed to hackers or other malicious actors, putting both individuals and organizations at risk. To address this challenge, real-time privacy-preserving techniques can be used to protect IoT data without compromising its value. This paper introduces an efficient Real-time privacy-preserving scheme (RT-PPS) for cloud-hosted IoT data. RT-PPS employs multi-authority attribute-based encryption on a hybrid cloud environment to keep data secure and private, while still allowing it to be processed and analyzed by cloud-hosted services. RT-PPS has efficient response time and resource consumption, which gives it the ability to handle a huge number of concurrent users at the same time without notable delay. The proposed RT-PPS has been validated through extensive experimental evaluation on a variety of configurations. Moreover, the proposed scheme has been computationally compared with the state-of-the-artwork. RT-PPS has shown excellent performance, effectiveness, and efficiency. The RT-PPS encryption time for a 1 GB dataset while considering 1024 slices is approximately 1000 ms. Also, the RT-PPS decryption time for a 1 GB ciphertext while considering 1024 slices are approximately 235 ms. Finally, RT-PPS is proven secure against any polynomial-time attacks and their variations that have at most a negligible advantage in the introduced security model. Moreover compared to most of the state-of-the-artwork, RT-PPS reduced the ciphertext size and lowered the computations in the encryption, key g
This paper addresses the problem of vision-based object geolocation using Unmanned Aerial Vehicles in Search and Rescue settings. It focuses on the task of automatically and accurately geolocating objects of different...
详细信息
Malware detection is one of the critical tasks of cybersecurity, especially considering the growing popularity of mobile devices. The integrity and security of mobile ecosystems rely on the capacity to identify malwar...
详细信息
The gaming industry produces vast amounts of user-generated feedback, making it challenging for developers to efficiently analyze and respond to real-time reviews. This study addresses the problem of classifying large...
详细信息
This work considers the problem of the noisy binary search in a sorted array. The noise is modeled by a parameter p that dictates that a comparison can be incorrect with probability p, independently of other queries. ...
详细信息
In this paper, we propose a framework to address the problem of guiding a person within a semi-structured environment in a socially acceptable manner that prioritises safety and comfort. We propose an algorithm based ...
详细信息
Readability-controlled text simplification (RCTS) rewrites texts to lower readability levels while preserving their meaning. RCTS models often depend on parallel corpora with readability annotations on both source and...
The problem of understanding trust relations in modern society is extremely interesting nowadays. In our project, we are going to use Multi-agent systems (MAS) to model and reproduce experiments from social sciences t...
详细信息
This study addresses the formidable challenges encountered in automated brain tumor segmentation, including the complexities of irregular shapes, ambiguous boundaries, and intensity variations across MRI modalities. M...
详细信息
暂无评论