Comparative analysis on cross-modal information retrieval: A review

P Kaur, HS Pannu, AK Malhi - Computer Science Review, 2021 - Elsevier
Human beings experience life through a spectrum of modes such as vision, taste, hearing,
smell, and touch. These multiple modes are integrated for information processing in our …

A survey on locality sensitive hashing algorithms and their applications

O Jafari, P Maurya, P Nagarkar, KM Islam… - arXiv preprint arXiv …, 2021 - arxiv.org
Finding nearest neighbors in high-dimensional spaces is a fundamental operation in many
diverse application domains. Locality Sensitive Hashing (LSH) is one of the most popular …

A practical tutorial on autoencoders for nonlinear feature fusion: Taxonomy, models, software and guidelines

D Charte, F Charte, S García, MJ del Jesus, F Herrera - Information Fusion, 2018 - Elsevier
Many of the existing machine learning algorithms, both supervised and unsupervised,
depend on the quality of the input characteristics to generate a good model. The amount of …

Linking sensitive data

P Christen, T Ranbaduge, R Schnell - Methods and techniques for …, 2020 - Springer
Sensitive personal data are created in many application domains, and there is now an
increasing demand to share, integrate, and link such data within and across organisations in …

A survey of privacy vulnerabilities of mobile device sensors

P Delgado-Santos, G Stragapede, R Tolosana… - ACM Computing …, 2022 - dl.acm.org
The number of mobile devices, such as smartphones and smartwatches, is relentlessly
increasing, to almost 6.8 billion by 2022, and along with it, the amount of personal and …

Network traffic fusion and analysis against DDoS flooding attacks with a novel reversible sketch

X Jing, Z Yan, X Jiang, W Pedrycz - Information Fusion, 2019 - Elsevier
Abstract Distributed Denial of Service (DDoS) flooding attacks are one of the typical attacks
over the Internet. They aim to prevent normal users from accessing specific network …

Nodesketch: Highly-efficient graph embeddings via recursive sketching

D Yang, P Rosso, B Li, P Cudre-Mauroux - Proceedings of the 25th ACM …, 2019 - dl.acm.org
Embeddings have become a key paradigm to learn graph representations and facilitate
downstream graph analysis tasks. Existing graph embedding techniques either sample a …

Investigating the avalanche effect of various cryptographically secure Hash functions and Hash-based applications

D Upadhyay, N Gaikwad, M Zaman, S Sampalli - IEEE Access, 2022 - ieeexplore.ieee.org
In modern cryptography, hash functions are considered as one of the key components for
secure communication. They play a vital role in a wide range of applications such as …

Secure storage model for digital forensic readiness

A Singh, RA Ikuesan, H Venter - IEEE Access, 2022 - ieeexplore.ieee.org
Securing digital evidence is a key factor that contributes to evidence admissibility during
digital forensic investigations, particularly in establishing the chain of custody of digital …

Deep internally connected transformer hashing for image retrieval

Z Chao, S Cheng, Y Li - Knowledge-Based Systems, 2023 - Elsevier
Transformer based on self-attention mechanism has made remarkable achievements in
natural language processing, which inspired the application research of Transformer in …