Security and privacy in metaverse: A comprehensive survey

Y Huang, YJ Li, Z Cai - Big Data Mining and Analytics, 2023 - ieeexplore.ieee.org
Metaverse describes a new shape of cyberspace and has become a hot-trending word since
2021. There are many explanations about what Meterverse is and attempts to provide a …

Machine learning–based cyber attacks targeting on controlled information: A survey

Y Miao, C Chen, L Pan, QL Han, J Zhang… - ACM Computing Surveys …, 2021 - dl.acm.org
Stealing attack against controlled information, along with the increasing number of
information leakage incidents, has become an emerging cyber security threat in recent …

Artificial intelligence, systemic risks, and sustainability

V Galaz, MA Centeno, PW Callahan, A Causevic… - Technology in …, 2021 - Elsevier
Automated decision making and predictive analytics through artificial intelligence, in
combination with rapid progress in technologies such as sensor technology and robotics are …

SoK: Fully homomorphic encryption compilers

A Viand, P Jattke, A Hithnawi - 2021 IEEE Symposium on …, 2021 - ieeexplore.ieee.org
Fully Homomorphic Encryption (FHE) allows a third party to perform arbitrary computations
on encrypted data, learning neither the inputs nor the computation results. Hence, it provides …

[HTML][HTML] Ethical hacking for IoT: Security issues, challenges, solutions and recommendations

JPA Yaacoub, HN Noura, O Salman… - Internet of Things and …, 2023 - Elsevier
In recent years, attacks against various Internet-of-Things systems, networks, servers,
devices, and applications witnessed a sharp increase, especially with the presence of 35.82 …

Design of personnel big data management system based on blockchain

J Chen, Z Lv, H Song - Future generation computer systems, 2019 - Elsevier
With the continuous development of information technology, enterprises, universities and
governments are constantly stepping up the construction of electronic personnel information …

[PDF][PDF] Blockchain-enabled wireless communications: a new paradigm towards 6G

J Wang, X Ling, Y Le, Y Huang, X You - National science review, 2021 - academic.oup.com
With the deployment of fifth-generation (5G) wireless networks worldwide, research on sixth-
generation (6G) wireless communications has commenced. It is expected that 6G networks …

Privacy in deep learning: A survey

F Mireshghallah, M Taram, P Vepakomma… - arXiv preprint arXiv …, 2020 - arxiv.org
The ever-growing advances of deep learning in many areas including vision,
recommendation systems, natural language processing, etc., have led to the adoption of …

Human factor, a critical weak point in the information security of an organization's Internet of things

K Hughes-Lartey, M Li, FE Botchey, Z Qin - Heliyon, 2021 - cell.com
Abstract Internet of Things (IoT) presents opportunities for designing new technologies for
organizations. Many organizations are beginning to accept these technologies for their daily …

Data pollution

O Ben-Shahar - Journal of Legal Analysis, 2019 - academic.oup.com
Digital information is the fuel of the new economy. But like the old economy's carbon fuel, it
also pollutes. Harmful “data emissions” are leaked into the digital ecosystem, disrupting …