Putting data privacy regulation into action: the differential capabilities of service frontline interfaces

L Steinhoff, KD Martin - Journal of Service Research, 2023 - journals.sagepub.com
Service frontline encounters between customers and service providers have been subject to
fundamental changes in recent years. As two major change agents, technology infusion and …

Dynamic deep genomics sequence encoder for managed file transfer

A Kaur, APS Chauhan, AK Aggarwal - IETE Journal of Research, 2023 - Taylor & Francis
The standard communication protocols transfer big data over the internet. However, the
challenge lies while sharing the massive amount of genomics data quickly over limited …

HybridRobustNet: enhancing detection of hybrid attacks in IoT networks through advanced learning approach

DA Sivasakthi, A Sathiyaraj, R Devendiran - Cluster Computing, 2024 - Springer
The proliferation of Internet of Things (IoT) devices has revolutionized various domains, but it
has also brought forth numerous security challenges. One of the most concerning threats is …

Intrusion detection framework using auto‐metric graph neural network optimized with hybrid woodpecker mating and capuchin search optimization algorithm in IoT …

S Govindaraju, WVR Vinisha, FH Shajin… - Concurrency and …, 2022 - Wiley Online Library
Intrusion detection systems (IDSs) are the major component of safe network. Due to the high
volume of network data, the false alarm report of intrusion to the network and intrusion …

Privacy Preservation Techniques in V2X Ecosystems: Safeguarding Individual Privacy in Connected Vehicle Environments

BJ Asaju - Journal of Artificial Intelligence Research, 2024 - thesciencebrigade.com
In recent years, the advancement of connected vehicle technologies has revolutionized
transportation systems worldwide. The seamless exchange of data between vehicles …

Big data, data mining, machine learning, and deep learning concepts in crime data

EC Ateş, GE Bostancı, S Msg - Journal of Penal Law and …, 2020 - dergipark.org.tr
Along with the rapid change of information technologies and the widespread use of the
internet over time, data stacks with ample diversity and quite large volumes has emerged …

Advancements in Intrusion Detection Systems for V2X: Leveraging AI and ML for Real-Time Cyber Threat Mitigation

BJ Asaju - Journal of Computational Intelligence and …, 2024 - thesciencebrigade.com
The proliferation of Internet of Things (IoT) technology has extended its reach to the
automotive domain, notably through Vehicle-to-Everything (V2X) communication. This …

Phenotype algorithm based big data analytics for cancer diagnose

K Sivakumar, NS Nithya, O Revathy - Journal of medical systems, 2019 - Springer
Nowadays, Cancer diagnosis is one of the major challenging characteristics for treating
cancer. The reality of cancer patients rely on the diagnosis of cancer at the early stages …

On the efficient digital code representation in DNA-based data storage

Y Cevallos, L Tello-Oquendo, D Inca… - Proceedings of the 7th …, 2020 - dl.acm.org
Deoxyribonucleic acid (DNA), the life molecule, is composed of four nucleotides: Adenine,
Guanine, Cytosine, and Thymine. The combinations of these nucleotides in the DNA encode …

Fast communication-efficient spectral clustering over distributed data

D Yan, Y Wang, J Wang, G Wu… - IEEE Transactions on Big …, 2019 - ieeexplore.ieee.org
The last decades have seen a surge of interests in distributed computing thanks to advances
in clustered computing and big data technology. Existing distributed algorithms typically …