Y He, G Meng, K Chen, X Hu… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deep learning has gained tremendous success and great popularity in the past few years. However, deep learning systems are suffering several inherent weaknesses, which can …
Machine learning models have been widely adopted in several fields. However, most recent studies have shown several vulnerabilities from attacks with a potential to jeopardize the …
With the increasing advancement of Internet of Things (IoT) enabled systems, smart medical devices open numerous opportunities for the healthcare sector. The success of using such …
As data collected and provided by Internet of Things (IoT) devices power an ever-growing number of applications and services, it is crucial that this data can be trusted. Data …
As more and more applications and services depend on data collected and provided by Internet of Things (IoT) devices, it is of importance that such data can be trusted. Data …
EB Sifah, Q Xia, KOBO Agyekum, H Xia… - IEEE Systems …, 2021 - ieeexplore.ieee.org
Cloud servers offer data owners the opportunityto upload and store encrypted data that several data users can access. However, after outsourcing data to the cloud, data owners …
Provenance information corresponds to essential metadata that describes the entities, users, and processes involved in the history and evolution of a data object. The benefits of tracking …
IoT devices have been adopted widely in the last decade which enabled collection of various data from different environments. Data storage poses challenges since the data may …
A successful application of an Internet of Things (IoT) based network depends on the accurate and successful delivery of a large amount of data collected from numerous …