[HTML][HTML] Privacy-preserving artificial intelligence in healthcare: Techniques and applications

N Khalid, A Qayyum, M Bilal, A Al-Fuqaha… - Computers in Biology and …, 2023 - Elsevier
There has been an increasing interest in translating artificial intelligence (AI) research into
clinically-validated applications to improve the performance, capacity, and efficacy of …

An improved authentication and key management scheme in context of IoT-based wireless sensor network using ECC

U Chatterjee, S Ray, S Adhikari, MK Khan… - Computer …, 2023 - Elsevier
Wireless sensor network (WSN) is used for sensing data/information from the nearby
environment with the help of various spatially dispersed miniature sensor devices/nodes …

[HTML][HTML] TinyWolf—Efficient on-device TinyML training for IoT using enhanced Grey Wolf Optimization

S Adhikary, S Dutta, AD Dwivedi - Internet of Things, 2024 - Elsevier
Training a deep learning model generally requires a huge amount of memory and
processing power. Once trained, the learned model can make predictions very fast with very …

A Comprehensive analysis of Cryptographic Algorithms: Evaluating Security, Efficiency, and Future Challenges

D Ramakrishna, MA Shaik - IEEE Access, 2024 - ieeexplore.ieee.org
Cryptographic techniques are reviewed in this literature study, with particular attention paid
to their applicability, Importance, contributions, And field strengths. These algorithms include …

A New Guess‐and‐Determine Method for Cryptanalysis of the GSM Encryption

A Jain, I Kaur, AK Sharma, NK Gupta… - …, 2023 - Wiley Online Library
Cryptanalysis is the process of finding flaws or oversights in an encryption algorithm. Nearly,
all encryption algorithms are carefully examined through cryptanalysis to determine the …

Price Prediction of Digital Currencies using Machine Learning

AD Dwivedi, S Dutta, S Adhikary… - 2023 IEEE 10th …, 2023 - ieeexplore.ieee.org
Cryptocurrencies have gained immense significance and popularity in recent times. With
thousands of digital currencies available, selecting the right one can be challenging for …

Multimedia Security Using Blockchain and IoT-Based Distributed System

S Dhar, A Khare - 2023 6th International Conference on …, 2023 - ieeexplore.ieee.org
This article explores how IoT device systems handle multimedia data and presents a secure
multimedia framework utilizing blockchain technology. The proposed framework high-lights …

Guest Editorial: Advanced information hiding techniques for industrial applications

AK Singh, S Berretti, H Lu - 2023 - Springer
Due to the remarkable development of the Internet, users are now allowed easy storage,
duplication, and distribution of digital data/contents for many applications. This has become …

[PDF][PDF] Image Encryption Based on Hybrid Parallel Algorithm: DES-Present Using 2D-Chaotic System.

SH Jasim, HK Hoomod, KA Hussein - International Journal of …, 2024 - researchgate.net
Image encryption algorithms have recently been developed to protect data from hackers and
give recipients privacy. DES is a widely recognized block cypher that has certain …

Next-Gen Cryptography: The Role of Machine Learning Applications in Privacy Preservation for Sensitive Data

G Padmapriya, V Vennila, K Anitha… - Machine Learning and …, 2024 - igi-global.com
In a time marked by an ever-increasing number of sensitive data and mounting worries
about breaches of privacy, the area of cryptography has emerged as the frontrunner in the …