[HTML][HTML] Blockchain for the metaverse: A Review

T Huynh-The, TR Gadekallu, W Wang… - Future Generation …, 2023 - Elsevier
Since Facebook officially changed its name to Meta in Oct. 2021, the metaverse has become
a new norm of social networks and three-dimensional (3D) virtual worlds. The metaverse …

Blockchain for the metaverse: A review

TR Gadekallu, W Wang, G Yenduri… - Future Generation …, 2023 - scholars.cityu.edu.hk
Since Facebook officially changed its name to Meta in Oct. 2021, the metaverse has become
a new norm of social networks and three-dimensional (3D) virtual worlds. The metaverse …

Review on security of federated learning and its application in healthcare

H Li, C Li, J Wang, A Yang, Z Ma, Z Zhang… - Future Generation …, 2023 - Elsevier
Artificial intelligence (AI) has led to a high rate of development in healthcare, and good
progress has been made on many complex medical problems. However, there is a lack of …

Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects

M Sadaf, Z Iqbal, AR Javed, I Saba, M Krichen… - Technologies, 2023 - mdpi.com
Autonomous vehicles (AV) are game-changing innovations that promise a safer, more
convenient, and environmentally friendly mode of transportation than traditional vehicles …

Efficiency optimization techniques in privacy-preserving federated learning with homomorphic encryption: A brief survey

Q Xie, S Jiang, L Jiang, Y Huang, Z Zhao… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Federated learning (FL) offers distributed machine learning on edge devices. However, the
FL model raises privacy concerns. Various techniques, such as homomorphic encryption …

[HTML][HTML] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN

L Golightly, P Modesti, R Garcia, V Chang - Cyber Security and Applications, 2023 - Elsevier
Access Control is a crucial defense mechanism organizations can deploy to meet modern
cybersecurity needs and legal compliance with data privacy. The aim is to prevent …

A Critical Investigation and Analysis of Strategic Techniques Before Approving Cloud Computing Service Frameworks

VV Vegesna - International Journal of Management, Technology …, 2023 - papers.ssrn.com
Cloud computing is becoming increasingly fashionable in distributed computing
environment. Processing and Data storage use cloud environment is becoming a movement …

Federated learning approach for early detection of chest lesion caused by COVID-19 infection using particle swarm optimization

DR Kandati, TR Gadekallu - Electronics, 2023 - mdpi.com
The chest lesion caused by COVID-19 infection pandemic is threatening the lives and well-
being of people all over the world. Artificial intelligence (AI)-based strategies are efficient …

Oral squamous cell carcinoma detection using EfficientNet on histopathological images

E Albalawi, A Thakur, MT Ramakrishna… - Frontiers in …, 2024 - frontiersin.org
Introduction Oral Squamous Cell Carcinoma (OSCC) poses a significant challenge in
oncology due to the absence of precise diagnostic tools, leading to delays in identifying the …

Blockchain-based decentralized and lightweight anonymous authentication for federated learning

M Fan, Z Zhang, Z Li, G Sun, H Yu… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Federated learning (FL) is a promising technology for achieving privacy-preserving edge
intelligence and has attracted extensive attention from industry and academia. However, in …