Privacy intelligence: A survey on image privacy in online social networks

C Liu, T Zhu, J Zhang, W Zhou - ACM Computing Surveys, 2022 - dl.acm.org
Image sharing on online social networks (OSNs) has become an indispensable part of daily
social activities, but it has also increased the risk of privacy invasion. An online image can …

Decision tree evaluation on sensitive datasets for secure e-healthcare systems

M Zhang, Y Chen, W Susilo - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
By collecting and analyzing patients'e-healthcare data in Medical Internet-of-Things (MIOT),
e-Healthcare providers can offer alternative and helpful evaluation services of the risk of …

Detecting malware by analyzing app permissions on android platform: A systematic literature review

A Ehsan, C Catal, A Mishra - Sensors, 2022 - mdpi.com
Smartphone adaptation in society has been progressing at a very high speed. Having the
ability to run on a vast variety of devices, much of the user base possesses an Android …

[HTML][HTML] DACP: Enforcing a dynamic access control policy in cross-domain environments

A Salehi, R Han, C Rudolph, M Grobler - Computer Networks, 2023 - Elsevier
Enabling hybrid authorisations to enforce dynamic access control policy from single-domain
to cross-domain environments (CDEs) is important for distributed services. However …

Decentralized lightweight group key management for dynamic access control in IoT environments

M Dammak, SM Senouci, MA Messous… - … on Network and …, 2020 - ieeexplore.ieee.org
Rapid growth of Internet of Things (IoT) devices dealing with sensitive data has led to the
emergence of new access control technologies in order to maintain this data safe from …

SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluation

G Liu, Z Yan, W Feng, X Jing, Y Chen, M Atiquzzaman - Information Fusion, 2021 - Elsevier
In order to evaluate network trust, different intrusion detection methods have been proposed.
However, it is difficult for a single detection node to collect massive data and perform …

[HTML][HTML] EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion

W Wei, J Wang, Z Yan, W Ding - Information Fusion, 2022 - Elsevier
Android has stood at a predominant position in mobile operating systems for many years.
However, its popularity and openness make it a desirable target of malicious attackers …

A novel decentralized group key management scheme for cloud-based vehicular IoT networks

R Kumar, SK Singh, DK Lobiyal, KT Chui… - International Journal of …, 2022 - igi-global.com
The vehicular internet of things (VIoT) network is connecting smart commuters to elevate
traffic problems and effectiveness that help to improve driving conditions for vehicles. Every …

A secured healthcare model for sensor data sharing with integrated emotional intelligence

KP Satamraju, M Balakrishnan - IEEE Sensors Journal, 2022 - ieeexplore.ieee.org
Integration of healthcare and Internet of Things (IoT) has a potential to revolutionize the
medical treatments, diagnosis and predict medical issues thereby enabling patients …

EncodeORE: reducing leakage and preserving practicality in order-revealing encryption

Z Liu, S Lv, J Li, Y Huang, L Guo… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Order-preserving encryption (OPE) is a cryptographic primitive that preserves the order of
plaintexts. In the past few years, many OPE schemes were proposed to solve the problem of …