C Thapa, S Camtepe - Computers in biology and medicine, 2021 - Elsevier
… that there will be no or less possibility of extraction of sensitive information from the linkage. … Despite the ability to improvedatasecurity due to the data encryption on blockchain, there …
Q Jiang, N Zhang, J Ni, J Ma, X Ma… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… secure access to both cloud and AVs. Three typical biometric encryption approaches, including fuzzy vault, fuzzy commitment, and fuzzyextractor, … We analyze the security and efficiency …
… the search process of literature and dataextraction. The protocol was … with improvedefficiency, to balance between security and … A fuzzy interface system mechanism was deployed to …
… that it delivers an improvedefficiency and high accuracy … data sizes, high dimensionality, and standard performance of … protect network protection and privacy. Machine learning is …
Y Li, S Wang, Y Yang, Z Deng - Mechanical Systems and Signal …, 2022 - Elsevier
… filtering and fuzzy entropy to eliminate the noises and improve the calculation efficiency. The … this paper due to the fact that variations in data patterns are more likely to be reflected in the …
… research by highlighting the performanceimprovement. … proved to have enhanced security and privacy. Fingerprint and iris … The effective features extracted from the feature extraction …
L Song, G Sun, H Yu, X Du… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
… identity and real-time location, and reduces the impact of fuzzy location on the efficiency of … in this paper is divided into three parts: the control center, security authentication layer and …
J Yu, H Li, D Liu - Journal of healthcare engineering, 2020 - Wiley Online Library
… the error rate, and improve the performance of data mining and feature extraction for medical data clustering. … Fuzzy clustering is regarded as one of the commonly used approaches for …
… that the LAPTAS meets all security and performance requirements. … to improve the manufacturing industry system’s security is … We select a fuzzyextractor to handle the user …