Privacy-preserving neural networks with homomorphic encryption: C hallenges and opportunities

B Pulido-Gaytan, A Tchernykh… - Peer-to-Peer Networking …, 2021 - Springer
Classical machine learning modeling demands considerable computing power for internal
calculations and training with big data in a reasonable amount of time. In recent years …

Uncertainty-aware decisions in cloud computing: Foundations and future directions

HMD Kabir, A Khosravi, SK Mondal… - ACM Computing …, 2021 - dl.acm.org
The rapid growth of the cloud industry has increased challenges in the proper governance of
the cloud infrastructure. Many intelligent systems have been developing, considering …

Cyber intrusion detection system based on a multiobjective binary bat algorithm for feature selection and enhanced bat algorithm for parameter optimization in neural …

WAHM Ghanem, SAA Ghaleb, A Jantan… - IEEE …, 2022 - ieeexplore.ieee.org
The staggering development of cyber threats has propelled experts, professionals and
specialists in the field of security into the development of more dependable protection …

Security threats, defense mechanisms, challenges, and future directions in cloud computing

S El Kafhali, I El Mir, M Hanini - Archives of Computational Methods in …, 2022 - Springer
Several new technologies such as the smart cities, the Internet of Things (IoT), and 5G
Internet need services offered by cloud computing for processing and storing more …

Cybersecurity enterprises policies: A comparative study

A Mishra, YI Alzoubi, AQ Gill, MJ Anwar - Sensors, 2022 - mdpi.com
Cybersecurity is a critical issue that must be prioritized not just by enterprises of all kinds, but
also by national security. To safeguard an organization's cyberenvironments, information …

E-learning based on cloud computing

W Wu, A Plakhtii - … Journal of Emerging Technologies in Learning …, 2021 - learntechlib.org
Modern technological paradigms of learning give educators an ability to support the
development of highly professional human resources. For this reason, teachers of higher …

Energy and delay efficient fog computing using caching mechanism

MH Shahid, AR Hameed, S ul Islam, HA Khattak… - Computer …, 2020 - Elsevier
Fog computing has emerged as an extension to the existing cloud infrastructure for
providing latency-aware and highly scalable services to geographically distributed end …

Design of secure image fusion technique using cloud for privacy-preserving and copyright protection

A Kumar - International Journal of Cloud Applications and …, 2019 - igi-global.com
Nowadays, the use of digital content or digital media is increasing day by day. Therefore,
there is a need to protect the digital document from both unauthorized users and authorized …

AR-RRNS: Configurable reliable distributed data storage systems for Internet of Things to ensure security

N Chervyakov, M Babenko, A Tchernykh… - Future Generation …, 2019 - Elsevier
Abstract Benefits of Internet of Things and cloud–fog-edge computing are associated with
the risks of confidentiality, integrity, and availability related with the loss of information …

A survey of case studies in production scheduling: Analysis and perspectives

HY Fuchigami, S Rangel - Journal of Computational Science, 2018 - Elsevier
The problems of production scheduling and sequencing refer to decision making regarding
the designation of jobs to available resources and their subsequent order to optimize pre …