Sri Lankan students, especially those from rural and low-income backgrounds, face significant challenges in accessing higher education, including university applications, career planning, and financial aid. This resea...
详细信息
Protein-protein interactions (PPI) are essential in keeping the cells functioning properly. Identifying PPI binding sites is a fundamental problem in system Biology, and it contributes to a better understanding of low...
详细信息
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definition...
详细信息
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definitions could hardly reach universal *** than providing a formal definition of the Metaverse,we list four must-have characteristics of the Metaverse:socialization,immersive interaction,real world-building,and *** characteristics not only carve the Metaverse into a novel and fantastic digital world,but also make it suffer from all security/privacy risks,such as personal information leakage,eavesdropping,unauthorized access,phishing,data injection,broken authentication,insecure design,and *** paper first introduces the four characteristics,then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic *** on the four characteristics and the findings of the current progress,the security and privacy issues in the Metaverse are *** then identify and discuss more potential critical security and privacy issues that can be caused by combining the four ***,the paper also raises some other concerns regarding society and humanity.
The perception of offensive language varies based on cultural, social, and individual perspectives. With the spread of social media, there has been an increase in offensive content online, necessitating advanced solut...
详细信息
Images captured in low-light or underwater environments are often accompanied by significant degradation, which can negatively impact the quality and performance of downstream tasks. While convolutional neural network...
详细信息
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need...
详细信息
The continuous revolution in Artificial Intelligence (AI) has played a significant role in the development of key consumer applications, including Industry 5.0, autonomous decision-making, fault diagnosis, etc. In pra...
详细信息
This research presents a web-based real-time Sri Lankan Sign Language (SLSL) translation system aimed at bridging communication gaps for individuals with speech and hearing disabilities. Leveraging advanced machine le...
详细信息
The extensive spread of DeepFake images on the internet has emerged as a significant challenge, with applications ranging from harmless entertainment to harmful acts like blackmail, misinformation, and spreading false...
详细信息
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,s...
详细信息
Secure k-Nearest Neighbor(k-NN)query aims to find k nearest data of a given query from an encrypted database in a cloud server without revealing privacy to the untrusted cloud and has wide applications in many areas,such as privacy-preservingmachine elearning gand secure biometric *** solutions have been put forward to solve this challenging ***,the existing schemes still suffer from various limitations in terms of efficiency and *** this paper,we propose a new encrypt-then-index strategy for the secure k-NN query,which can simultaneously achieve sub-linear search complexity(efficiency)and support dynamical update over the encrypted database(flexibility).Specifically,we propose a novel algorithm to transform the encrypted database and encrypted query points in the *** indexing the transformed database using spatial data structures such as the R-tree index,our strategy enables sub-linear complexity for secure k-NN queries and allows users to dynamically update the encrypted *** the best of our knowledge,the proposed strategy is the first to simultaneously provide these two *** theoretical analysis and extensive experiments,we formally prove the security and demonstrate the efficiency of our scheme.
暂无评论