Synthetic data generation for tabular health records: A systematic review

M Hernandez, G Epelde, A Alberdi, R Cilla, D Rankin - Neurocomputing, 2022 - Elsevier
Synthetic data generation (SDG) research has been ongoing for some time with promising
results in different application domains, including healthcare, biometrics and energy …

Machine learning models for secure data analytics: A taxonomy and threat model

R Gupta, S Tanwar, S Tyagi, N Kumar - Computer Communications, 2020 - Elsevier
In recent years, rapid technological advancements in smart devices and their usage in a
wide range of applications exponentially increases the data generated from these devices …

An efficient and secure big data storage in cloud environment by using triple data encryption standard

MN Ramachandra, M Srinivasa Rao, WC Lai… - Big Data and Cognitive …, 2022 - mdpi.com
In recent decades, big data analysis has become the most important research topic. Hence,
big data security offers Cloud application security and monitoring to host highly sensitive …

A survey of context-aware access control mechanisms for cloud and fog networks: Taxonomy and open research issues

ASM Kayes, R Kalaria, IH Sarker, MS Islam, PA Watters… - Sensors, 2020 - mdpi.com
Over the last few decades, the proliferation of the Internet of Things (IoT) has produced an
overwhelming flow of data and services, which has shifted the access control paradigm from …

Post-quantum era privacy protection for intelligent infrastructures

L Malina, P Dzurenda, S Ricci, J Hajny… - IEEE …, 2021 - ieeexplore.ieee.org
As we move into a new decade, the global world of Intelligent Infrastructure (II) services
integrated into the Internet of Things (IoT) are at the forefront of technological advancements …

A MapReduce based approach for secure batch satellite image encryption

MAS Al-Khasawneh, M Faheem, EA Aldhahri… - IEEE …, 2023 - ieeexplore.ieee.org
The overarching goal of this research was to examine the state of satellite imagery security
in relation to its deteriorating form due to rising demand. The most common approaches to …

Contemporary advances in multi-access edge computing: A survey of fundamentals, architecture, technologies, deployment cases, security, challenges, and directions

M Mahbub, RM Shubair - Journal of Network and Computer Applications, 2023 - Elsevier
With advancements of cloud technologies Multi-Access Edge Computing (MEC) emerged as
a remarkable edge-cloud technology to provide computing facilities to resource-restrained …

Towards secure big data analysis via fully homomorphic encryption algorithms

R Hamza, A Hassan, A Ali, MB Bashir, SM Alqhtani… - Entropy, 2022 - mdpi.com
Privacy-preserving techniques allow private information to be used without compromising
privacy. Most encryption algorithms, such as the Advanced Encryption Standard (AES) …

A blockchain-enabled privacy-preserving verifiable query framework for securing cloud-assisted industrial internet of things systems

MS Rahman, I Khalil, N Moustafa… - IEEE Transactions …, 2021 - ieeexplore.ieee.org
Advanced Industrial Internet-of-Things (IIoT), such as smart grids, 5G-enabled unmanned
aerial vehicles (UAV), and supply chain 4. o, can be used to facilitate smart management …

Evolve: Enhancing unsupervised continual learning with multiple experts

X Yu, T Rosing, Y Guo - Proceedings of the IEEE/CVF winter …, 2024 - openaccess.thecvf.com
Recent years have seen significant progress in unsupervised continual learning methods.
Despite their success in controlled settings, their practicality in real-world contexts remains …