[HTML][HTML] Video and audio deepfake datasets and open issues in deepfake technology: being ahead of the curve

Z Akhtar, TL Pendyala, VS Athmakuri - Forensic Sciences, 2024 - mdpi.com
The revolutionary breakthroughs in Machine Learning (ML) and Artificial Intelligence (AI) are
extensively being harnessed across a diverse range of domains, eg, forensic science …

Open problems in technical ai governance

A Reuel, B Bucknall, S Casper, T Fist, L Soder… - arXiv preprint arXiv …, 2024 - arxiv.org
AI progress is creating a growing range of risks and opportunities, but it is often unclear how
they should be navigated. In many cases, the barriers and uncertainties faced are at least …

Edge deep learning in computer vision and medical diagnostics: a comprehensive survey

Y Xu, TM Khan, Y Song, E Meijering - Artificial Intelligence Review, 2025 - Springer
Edge deep learning, a paradigm change reconciling edge computing and deep learning,
facilitates real-time decision making attuned to environmental factors through the close …

SoK: Understanding Design Choices and Pitfalls of Trusted Execution Environments

M Li, Y Yang, G Chen, M Yan, Y Zhang - Proceedings of the 19th ACM …, 2024 - dl.acm.org
Trusted execution environment (TEE) is a revolutionary technology that enables secure
remote execution (SRE) of cloud workloads on untrusted server-side computing platforms …

Efficient decentralized federated singular vector decomposition

D Chai, J Zhang, L Yang, Y Jin, L Wang… - 2024 USENIX Annual …, 2024 - usenix.org
Federated singular value decomposition (SVD) is a foundation for many real-world
distributed applications. Existing federated SVD studies either require external servers …

Enhancing Industrial IoT Network Security through Blockchain Integration

Y Bobde, G Narayanan, M Jati, RSP Raj, I Cvitić… - Electronics, 2024 - mdpi.com
In the rapidly evolving landscape of industrial ecosystems, Industrial IoT networks face
increasing security challenges. Traditional security methods often struggle to protect these …

Enhancing user identification through batch averaging of independent window subsequences using smartphone and wearable data

R Ahmadian, M Ghatee, J Wahlström - Computers & Security, 2025 - Elsevier
Throughout daily life, individuals partake in various activities such as walking, sitting, and
drinking, often in a random manner. These physical activities generally exhibit similar …

TrustHealth: Enhancing eHealth Security with Blockchain and Trusted Execution Environments

J Li, X Luo, H Lei - Electronics, 2024 - mdpi.com
The rapid growth of electronic health (eHealth) systems has led to serious security and
privacy challenges, highlighting the critical importance of protecting sensitive healthcare …

MultiTEE: Distributing Trusted Execution Environments

S Ott, B Orthen, A Weidinger, J Horsch… - Proceedings of the 19th …, 2024 - dl.acm.org
The adoption of wearable technologies, such as smartwatches or wristbands, is rising. End-
users expect to use all of their devices in an interconnected and seamless manner to …

Oml: Open, monetizable, and loyal ai

Z Cheng, E Contente, B Finch, O Golev… - arXiv preprint arXiv …, 2024 - arxiv.org
Artificial Intelligence (AI) has steadily improved across a wide range of tasks. However, the
development and deployment of AI are almost entirely controlled by a few powerful …