Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current c...
详细信息
Searchable encryption provides an effective way for data security and privacy in cloud *** can retrieve encrypted data in the cloud under the premise of protecting their own data security and ***,most of the current content-based retrieval schemes do not contain enough semantic information of the article and cannot fully reflect the semantic information of the *** this paper,we propose two secure and semantic retrieval schemes based on BERT(bidirectional encoder representations from transformers)named SSRB-1,*** training the documents with BERT,the keyword vector is generated to contain more semantic information of the documents,which improves the accuracy of retrieval and makes the retrieval result more consistent with the user’s ***,through testing on real data sets,it is shown that both of our solutions are feasible and effective.
Capturing dynamic preference features from user historical behavioral data is widely applied to improve the accuracy of recommendations in sequential recommendation tasks. However, existing deep neural network-based s...
详细信息
This paper implements a network traffic analysis system with a focus on cybersecurity applications. The novelty lies in its combined approach of real-time traffic monitoring and machine learning-driven anomaly detecti...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconc...
详细信息
A new era of data access and management has begun with the use of cloud computing in the healthcare *** the efficiency and scalability that the cloud provides, the security of private patient data is still a majorconcern. Encryption, network security, and adherence to data protection laws are key to ensuring the confidentialityand integrity of healthcare data in the cloud. The computational overhead of encryption technologies could leadto delays in data access and processing rates. To address these challenges, we introduced the Enhanced ParallelMulti-Key Encryption Algorithm (EPM-KEA), aiming to bolster healthcare data security and facilitate the securestorage of critical patient records in the cloud. The data was gathered from two categories Authorization forHospital Admission (AIH) and Authorization for High Complexity *** use Z-score normalization forpreprocessing. The primary goal of implementing encryption techniques is to secure and store massive amountsof data on the cloud. It is feasible that cloud storage alternatives for protecting healthcare data will become morewidely available if security issues can be successfully fixed. As a result of our analysis using specific parametersincluding Execution time (42%), Encryption time (45%), Decryption time (40%), Security level (97%), and Energyconsumption (53%), the system demonstrated favorable performance when compared to the traditional *** suggests that by addressing these security concerns, there is the potential for broader accessibility to cloudstorage solutions for safeguarding healthcare data.
Real-world applications often require teams of agents to coordinate strategies against adversaries. However, existing MARL models overlook resource constraints and task complexity, limiting their practical use. To add...
详细信息
This research paper delves into the realm of lung cancer diagnosis, a critical area in modern healthcare owing to its substantial global impact. Leveraging cutting-edge technology and machine learning methodologies, s...
详细信息
Audio-driven talking-head synthesis has become a significant focus in the field of virtual human applications. However, existing methodologies face challenges in effectively synchronizing audio and video, especially i...
详细信息
Domain-driven design (DDD) aims to iteratively develop software based on a realistic model of the problem domain. This approach requires a thorough understanding of the domain's requirements and ensuring that the ...
详细信息
Due to the advantages of privacy-preserving, Federated Learning (FL) is widely used in distributed machine learning systems. However, existing FL methods suffer from low-inference performance caused by data heterogene...
详细信息
Topic modeling is commonly used to discover potential semantic structures in different domain corpora, and it is an essential tool for semantic retrieval, feature extraction, and target classification of large amounts...
详细信息
暂无评论