Security vulnerability detection with enhanced privacy preservation for edge computing using hybrid machine learning approach

SP Patil - 2022 - norma.ncirl.ie
Edge computing, which is now a slashing method, allows for the processing and calculation
of upstream data in consideration of IoT properties and downstream data with the assistance …

A privacy protection method for IoT nodes based on convolutional neural network

Y Han, D Sun, Y Li - International Journal of Reasoning …, 2024 - inderscienceonline.com
In order to improve the security of internet of things, a privacy protection method of internet of
things nodes based on convolutional neural network is proposed. Firstly, the flow model of …

Research on Face Attribute Privacy Protection Method Based on Multi task Learning

F Gu, E Blancaflor, M Abisado - 2023 5th International …, 2023 - ieeexplore.ieee.org
With the widespread application of facial image recognition in fields such as finance, social
media, and transportation, the privacy data of facial images is also frequently leaked. In …

A Pareto-Efficient Task-Allocation Framework Based on Deep Reinforcement Learning Algorithm in MEC

W Liu, S Zhao, Z Yu, G Wang, X Liu - International Conference on …, 2022 - Springer
Mobile-edge computing (MEC) has emerged as a promising paradigm that moves tasks
running in the cloud to edge servers. In MEC systems, there are various individual …

The Computational and Symbolic Security Analysis Connections

UV Kumar, S Pachauri - 2022 4th International Conference on …, 2022 - ieeexplore.ieee.org
A considerable portion of computing power is always required to perform symbolic
calculations. The reliability and effectiveness of algorithms are two of the most significant …

Desarrollo de una aplicación web que genere rostros de personas que no existen en el mundo real

M Quezada-García… - … American Journal of …, 2024 - tech.iberojournals.com
Con el creciente desarrollo de la Generative Adversarial Network (GAN), la generación de
imágenes son un desafío emocionante en el campo del aprendizaje profundo y la …

Data pricing for vertical federated learning: an approach based on data contribution

Z Zhang, X Li, S Yang - International Conference on Cyber …, 2023 - spiedigitallibrary.org
Federated Learning (FedL) emerged as a privacy-aware alternative, creating an effective
means for multiple data providers to enable collaboration on training models without …

Blockchain-Based Secure Communication of Iot in Space-Air-Ground

Y Zhang, P Zhang, M Guizani, Z Ji, J Wang… - Available at SSRN … - papers.ssrn.com
Abstract Under the Internet of Things (IoT) era, the cooperation of multiple service providers
has facilitated the development of large-scale distributed IoT with a strong demand for …

Security Threats in SIoT

AV Ajay, HB Pramod - Advances in SIoT (Social Internet of Things …, 2023 - taylorfrancis.com
Social Internet of Things (SIoT) is an expansion of the Internet of Things (IoT) that meets with
person-to-person communication ideas to make informal organizations of interconnected …

Intelligent IoT Terminal Software Identification System Based on Behavior Features

Z Ye, C Chen, N Li, W Yang, Z Zhang, C Cao - … Conference on Big Data …, 2022 - Springer
Abstract Intelligent IoT (Internet of Things) terminals are widely deployed in IoT systems and
complete tasks such as data collection, data processing and analysis. The intelligent …