K-means clustering algorithms: A comprehensive review, variants analysis, and advances in the era of big data

AM Ikotun, AE Ezugwu, L Abualigah, B Abuhaija… - Information …, 2023 - Elsevier
Advances in recent techniques for scientific data collection in the era of big data allow for the
systematic accumulation of large quantities of data at various data-capturing sites. Similarly …

AI makes crypto evolve

B Zolfaghari, T Koshiba - Applied System Innovation, 2022 - mdpi.com
The recent literature reveals a dichotomy formed by a coevolution between cryptography
and Artificial Intelligence (AI). This dichotomy consists of two sides, namely Crypto …

A novel secure and distributed architecture for privacy-preserving healthcare system

RU Haque, ASMT Hasan, A Daria, A Rasool… - Journal of Network and …, 2023 - Elsevier
Patients often visit several hospitals to obtain medication, generating a significant volume of
data. Moreover, hospitals use different data analytic techniques to improve healthcare …

Day-ahead electric vehicle charging behavior forecasting and schedulable capacity calculation for electric vehicle parking lot

M Xu, S Gao, J Zheng, X Huang, C Wu - Energy, 2024 - Elsevier
Abstract The Electric Vehicle Parking Lot (EVPL) aims to address the growing demand for
EV charging infrastructure. EVs connected to EVPLs have extended access times compared …

Privacy preserving via multi-key homomorphic encryption in cloud computing

X Li, H Li, J Gao, R Wang - Journal of Information Security and Applications, 2023 - Elsevier
As the world grapples with the COVID-19 and its variants, multi-user collaboration by means
of cloud computing is ubiquitous. How to make better use of cloud resources while …

A Lightweight Mutual Privacy Preserving -means Clustering in Industrial IoT

C Hu, J Liu, H Xia, S Deng, J Yu - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
In many industrial Internet of Things application schemes, participants, such as IoT devices,
often share information with each others for analysis and categorization purpose. Through …

GMS: an efficient fully homomorphic encryption scheme for secure outsourced matrix multiplication

J Gao, Y Gao - The Journal of Supercomputing, 2024 - Springer
Fully homomorphic encryption (FHE) is capable of handling sensitive encrypted data in
untrusted computing environments. The efficient application of FHE schemes in secure …

SEMMI: Multi-party security decision-making scheme for linear functions in the internet of medical things

C Li, L Yang, S Yu, W Qin, J Ma - Information Sciences, 2022 - Elsevier
Abstract In the Internet of Medical Things (IoMT), developing models using machine learning
algorithms can detect and assist users effectively in identifying health issues. Due to the risk …

A tradeoff paradigm shift in cryptographically-secure pseudorandom number generation based on discrete logarithm

T Koshiba, B Zolfaghari, K Bibak - Journal of Information Security and …, 2023 - Elsevier
Discrete logarithmic pseudorandom number generators are a prevailing class of
cryptographically-secure pseudorandom number generators (CSPRNGs). In generators of …

Privacy-Preserving Machine Learning in Cloud-Edge-End Collaborative Environments

W Yang, H Wang, Z Li, Z Niu, L Wu… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
We propose a privacy-preserving machine learning scheme based on the cloud-edge–end
architecture to address issues like weak computing power of Internet of Things (IoT) …