Complementing IoT services through software defined networking and edge computing: A comprehensive survey

W Rafique, L Qi, I Yaqoob, M Imran… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Millions of sensors continuously produce and transmit data to control real-world
infrastructures using complex networks in the Internet of Things (IoT). However, IoT devices …

A nomadic multi-agent based privacy metrics for e-health care: a deep learning approach

C Dhasarathan, M Shanmugam, M Kumar… - Multimedia Tools and …, 2024 - Springer
In recent years, there has been a surge in the use of deep learning systems for e-healthcare
applications. While these systems can provide significant benefits regarding improved …

Multidimensional grid-based clustering with local differential privacy

N Fu, W Ni, H Hu, S Zhang - Information Sciences, 2023 - Elsevier
Privacy-preserving clustering has received increasing research attention in recent years.
Local differential privacy (LDP) is a privacy model without relying on trusted third parties. It …

A study on attention-based LSTM for abnormal behavior recognition with variable pooling

K Zhou, B Hui, J Wang, C Wang, T Wu - Image and Vision Computing, 2021 - Elsevier
Behavior recognition is a well-known computer vision mobile technology. It has been used
in many applications such as video surveillance, motion detection on devices, human …

Developing smart city services using intent‐aware recommendation systems: A survey

W Rafique, AS Hafid, J Qadir - Transactions on Emerging …, 2023 - Wiley Online Library
Smart cities could be defined as urban areas that use Information and Communication
Technology (ICT) to solve city problems in efficient and sustainable ways. Intent‐aware …

A mutual certificate-based data privacy scheme for ubiquitous and sustainable computing system users

TSB Damodhar, P Anandan, C Nalini, MA Jerlin… - Sustainable Energy …, 2023 - Elsevier
Ubiquitous sustainable computing systems are deployed for providing complex application
services and processing for real-time applications. Data exchange and sharing are …

Towards privacy preservation of federated learning in artificial intelligence of things

Z Xiong - 2023 - scholarworks.gsu.edu
Under the need of processing huge amounts of data, providing high-quality service, and
protecting user privacy in Artificial Intelligence of Things (AIoT), Federated Learning (FL) has …

Balancing Ubiquitous Computing: Addressing Ethical, Privacy, and Cybersecurity Challenges for Responsible and Secure Implementation in Malaysia

K Rajagopal, M Abdulnabi… - 2023 IEEE 21st Student …, 2023 - ieeexplore.ieee.org
Ubiquitous computing, integrating technology seamlessly into daily life, holds immense
potential for Malaysia's digital transformation. This paper explores the ethical, privacy, and …

Hybrid convolutional neural networks in human resource recommendation

N Huang, X Wang - Intelligent Decision Technologies, 2024 - journals.sagepub.com
The study proposes a new algorithm combining a gradient boosting tree algorithm with a
hybrid convolutional neural network in order to design a better human resource …

Histogram publication over numerical values under local differential privacy

X Zheng, K Yan, J Duan, W Tang… - … and Mobile Computing, 2021 - Wiley Online Library
Local differential privacy has been considered the standard measurement for privacy
preservation in distributed data collection. Corresponding mechanisms have been designed …