Search
Now showing items 31-40 of 238
Privacy-preserving Deep-learning Models for Fingerprint Data using Differential Privacy
(
Association for Computing Machinery, Inc
, 2023 , Conference Paper)
Fingerprint recognition is a widely adopted biometric authentication method that leverages the unique characteristics of fingerprints to identify individuals. Its applications range from access control and authentication ...
A Lightweight Central Learning Approach for Arrhythmia Detection from ECG Signals
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Conference Paper)
With the development of Internet-of-Things (IoT) applications, the concept of smart healthcare applications has gradually emerged to be the main factor in medicine. In fact, this raises the need to have a secure system ...
Overview of CheckThat! 2020 English: Automatic Identification and Verification of Claims in Social Media
(
CEUR-WS
, 2020 , Conference Paper)
We present an overview of the third edition of the CheckThat! Lab at CLEF 2020. The lab featured five tasks in Arabic and English, and here we focus on the three English tasks. Task 1 challenged the participants to predict ...
Interactive Graphical Access Control Tools
(
IEEE Computer Society
, 2023 , Conference Paper)
Access control (AC) policy creation and implementation is challenging because of its complex structure and specifications. This paper explores the potential of two novel interactive graphical displays whose design draws ...
CheckThat! at CLEF 2020: Enabling the automatic identification and verification of claims in social media
(
Springer
, 2020 , Conference Paper)
We describe the third edition of the CheckThat! Lab, which is part of the 2020 Cross-Language Evaluation Forum (CLEF). CheckThat! proposes four complementary tasks and a related task from previous lab editions, offered in ...
Secure Wireless Sensor Networks for Anti-Jamming Strategy Based on Game Theory
(
IEEE
, 2023 , Conference Paper)
The Wireless Sensor Networks (WSN) are designed to remotely monitor and control specific physical or environmental conditions. However, due to the open nature of WSN, many threats and attacks may arise by malicious users ...
Analysis of Predictive Models for Revealing Household Characteristics using Smart Grid Data
(
IEEE Computer Society
, 2023 , Conference Paper)
The Smart Grid Advanced Metering Infrastructure (AMI) has revolutionized the smart grid network, generating vast amounts of data that can be utilized for diverse objectives, one of which is Household Characteristics ...
Machine Learning Techniques for Network Anomaly Detection: A Survey
(
IEEE
, 2020 , Conference Paper)
Nowadays, distributed data processing in cloud computing has gained increasing attention from many researchers. The intense transfer of data has made the network an attractive and vulnerable target for attackers to exploit ...
Smartphone-based diabetic retinopathy severity classification using convolution neural networks
(
Springer
, 2021 , Conference Paper)
With diabetes growing at an alarming rate, changes in the retina causes a condition called diabetic retinopathy which eventually leads to blindness. Early detection of diabetic retinopathy is the best way to provide good ...
Edge Detection with multi-scale representation and refined Network
(
Institution of Engineering and Technology
, 2022 , Conference Paper)
Edge detection is a representation of boundaries between objects and regions in an image. Due to the variations of types, scales, intensities as well as background, the detection of these boundaries represents a challenge ...