[HTML][HTML] Blockchain and its derived technologies shape the future generation of digital businesses: a focus on decentralized finance and the Metaverse

SB Far, AI Rad, MR Asaar - Data Science and Management, 2023 - Elsevier
Without a doubt, blockchain, as one of the most valuable technological advancements, has
been introduced over the past decade and has played a significant role in the industrial …

Decision tree evaluation on sensitive datasets for secure e-healthcare systems

M Zhang, Y Chen, W Susilo - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
By collecting and analyzing patients'e-healthcare data in Medical Internet-of-Things (MIOT),
e-Healthcare providers can offer alternative and helpful evaluation services of the risk of …

Privacy-preserving collaborative data collection and analysis with many missing values

Y Sei, JA Onesimu, H Okumura… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Privacy-preserving data mining techniques are useful for analyzing various information,
such as Internet of Things data and COVID-19-related patient data. However, collecting a …

A Lightweight Mutual Privacy Preserving -means Clustering in Industrial IoT

C Hu, J Liu, H Xia, S Deng, J Yu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In many industrial Internet of Things application schemes, participants, such as IoT devices,
often share information with each others for analysis and categorization purpose. Through …

[PDF][PDF] Intelligent agriculture technology based on internet of things

L Sun, H Sun, N Cao, X Han, G Cao… - Intell. Autom. Soft …, 2022 - pdfs.semanticscholar.org
Although the application of agricultural product traceability technology is a key point to
realize Modern Agricultural IoT, it has still encountered various food safety problems. For …

Quantifying the uncertainty of LLM hallucination spreading in complex adaptive social networks

G Hao, J Wu, Q Pan, R Morello - Scientific Reports, 2024 - nature.com
Large language models (LLMs) are becoming a significant source of content generation in
social networks, which is a typical complex adaptive system (CAS). However, due to their …

Secure multi-party computation of graphs' intersection and union under the malicious model

X Liu, XF Tu, D Luo, G Xu, NN Xiong, XB Chen - Electronics, 2023 - mdpi.com
In recent years, with the development of information security, secure multi-party computation
has gradually become a research hotspot in the field of privacy protection. The intersection …

[PDF][PDF] MINE: a method of multi-interaction heterogeneous information network embedding

D Zhu, Y Sun, X Li, HW Du, RN Qu, PP Yu… - … , Materials & Continua, 2020 - researchgate.net
Interactivity is the most significant feature of network data, especially in social networks.
Existing network embedding methods have achieved remarkable results in learning network …

[PDF][PDF] Performance Analysis of Cloud-based Health Care Data Privacy System Using Hybrid Techniques

S Kumari, CN Asha, U Rajashekhar… - International Journal of …, 2022 - npublications.com
At present, due to the various hacking approaches, the protection for any data transmitted
through any channel or mode is one of the important issues. Nowadays, providing data …

[PDF][PDF] Data Science and Management

SB Far, SMH Bamakan - researchgate.net
Without a doubt, blockchain, as one of the most valuable technological advancements, has
been introduced over the past decade and has played a significant role in the industrial …