Recent advancements in finger vein recognition technology: methodology, challenges and opportunities

K Shaheed, A Mao, I Qureshi, M Kumar, S Hussain… - Information …, 2022 - Elsevier
Finger vein recognition biometric trait is a significant biometric modality that is considered
more secure, reliable, and emerging. This article presents a review to focus on the recent …

[HTML][HTML] A systematic review of finger vein recognition techniques

K Shaheed, H Liu, G Yang, I Qureshi, J Gou, Y Yin - Information, 2018 - mdpi.com
Biometric identification is the study of physiological and behavioral attributes of an individual
to overcome security problems. Finger vein recognition is a biometric technique used to …

[HTML][HTML] A trust-based collaborative filtering algorithm for E-commerce recommendation system

L Jiang, Y Cheng, L Yang, J Li, H Yan… - Journal of ambient …, 2019 - Springer
The rise of e-commerce has not only given consumers more choice but has also caused
information overload. In order to quickly find favorite items from vast resources, users are …

Privacy-preserving Naive Bayes classifiers secure against the substitution-then-comparison attack

C Gao, Q Cheng, P He, W Susilo, J Li - Information Sciences, 2018 - Elsevier
Naive Bayes (NB) is a simple but highly practical classifier, with a wide range of applications
including spam filters, cancer diagnosis and face recognition, to name a few examples only …

A mobile malware detection method using behavior features in network traffic

S Wang, Z Chen, Q Yan, B Yang, L Peng… - Journal of Network and …, 2019 - Elsevier
Android has become the most popular mobile platform due to its openness and flexibility.
Meanwhile, it has also become the main target of massive mobile malware. This …

A privacy-preserving and verifiable federated learning scheme

X Zhang, A Fu, H Wang, C Zhou… - ICC 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
Due to the complexity of the data environment, many organizations prefer to train deep
learning models together by sharing training sets. However, this process is always …

Bayesopt adversarial attack

B Ru, A Cobb, A Blaas, Y Gal - International Conference on …, 2019 - openreview.net
Black-box adversarial attacks require a large number of attempts before finding successful
adversarial examples that are visually indistinguishable from the original input. Current …

Privacy preserving multi-party computation delegation for deep learning in cloud computing

X Ma, F Zhang, X Chen, J Shen - Information Sciences, 2018 - Elsevier
The recent advances in deep learning have improved the state of the art in artificial
intelligence, and one of the most important stimulants of this success is the large volume of …

[HTML][HTML] MalInsight: A systematic profiling based malware detection framework

W Han, J Xue, Y Wang, Z Liu, Z Kong - Journal of Network and Computer …, 2019 - Elsevier
To handle the security threat faced by the widespread use of Internet of Things (IoT) devices
due to the ever-lasting increase of malware, the security researchers increasingly rely on …

[HTML][HTML] Applications in security and evasions in machine learning: a survey

R Sagar, R Jhaveri, C Borrego - Electronics, 2020 - mdpi.com
In recent years, machine learning (ML) has become an important part to yield security and
privacy in various applications. ML is used to address serious issues such as real-time …