Browsing by Title
Now showing items 20428-20447 of 50342
-
Privacy Leakage in Smart Homes and Its Mitigation: IFTTT as a Case Study
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The combination of smart home platforms and automation apps introduce many conveniences to smart home users. However, this also brings the potential of privacy leakage. If a smart home platform is permitted to collect all ... -
Privacy preserving computation in cloud using noise-free fully homomorphic encryption (FHE) schemes
( Springer Verlag , 2016 , Conference Paper)With the wide adoption of cloud computing paradigm, it is important to develop appropriate techniques to protect client data privacy in the cloud. Encryption is one of the major techniques that could be used to achieve ... -
Privacy-Aware Collaborative Task Offloading in Fog Computing
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Article)Numerous new applications have been proliferated with the mature of 5G, which generates a large number of latency-sensitive and computationally intensive mobile data requests. The real-time requirement of these mobile data ... -
Privacy-preserving artificial intelligence in healthcare: Techniques and applications
( Elsevier , 2023 , Article Review)There has been an increasing interest in translating artificial intelligence (AI) research into clinically-validated applications to improve the performance, capacity, and efficacy of healthcare services. Despite substantial ... -
Privacy-preserving data aggregation in smart power grid systems
(2021 , Master Thesis)Smart Meters (SMs) are IoT end devices used to collect user utility consumption withlimited processing power on the edge of the smart grid (SG). While SMs have significantapplications in providing data analysis to the ... -
PRIVACY-PRESERVING DECENTRALIZED INTRUSION DETECTION SYSTEM FOR IOT DEVICES USING DEEP LEARNING
(2022 , Dissertation)The convergence of advanced networking, breakthrough distributed systems technologies, and smart services has rapidly expanded the threat landscape for IoT devices. Researchers have been looking into lightweight and ... -
Privacy-Preserving Distributed IDS Using Incremental Learning for IoT Health Systems
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Existing techniques for incremental learning are computationally expensive and produce duplicate features leading to higher false positive and true negative rates. We propose a novel privacy-preserving intrusion detection ... -
Privacy-preserving federated learning cyber-threat detection for intelligent transport systems with blockchain-based security
( John Wiley and Sons Inc , 2022 , Article)Artificial intelligence (AI) techniques implemented at a large scale in intelligent transport systems (ITS), have considerably enhanced the vehicles' autonomous behaviour in making independent decisions about cyber threats, ... -
A privacy-preserving handover authentication protocol for a group of MTC devices in 5G networks
( Elsevier Ltd , 2022 , Article)Machine Type Communication (MTC) has been emerging for a wide range of applications and services for the Internet of Things (IoT). In some scenarios, a large group of MTC devices (MTCDs) may enter the communication coverage ... -
A Privacy-Preserving Medical Data Sharing Scheme Based on Consortium Blockchain
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Electronic medical records (EMRs) can provide medical institutes with a number of research materials, which could promote the development of medical field. In order to protect patients' privacy while achieving efficient ... -
Privacy-Preserving Support Vector Machine Training over Blockchain-Based Encrypted IoT Data in Smart Cities
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)Machine learning (ML) techniques have been widely used in many smart city sectors, where a huge amount of data is gathered from various (IoT) devices. As a typical ML model, support vector machine (SVM) enables efficient ... -
Private Function Evaluation Using Intel's SGX
( Qatar University Press , 2020 , Poster)Private Function Evaluation (PFE) is the problem of evalu- ating one party's private data using a private function owned by another party. Several techniques were presented to tackle PFE by running universal circuits in ... -
PRIVATIZATION AND CORPORATE PERFORMANCE
( Vallecchi Editore , 2016 , Article)This study investigates the effect of privatization on corporate performance in the mining, financial and services sectors in Jordan as a case study of privatization experience of an emerging market. The study includes six ... -
Privileged but Immobile: Citizenship and Career Path of the Youths of Bicultural Families in Kuwait
( Gulf Studies center - College of Arts & Sciences - Qatar University , 2020 , Conference Paper)This paper aims to depict privilegedness yet immobilities of the youths of bicultural families on their citizenship and career path, particularly on the second generations who have roots of Filipino traits on one side and ... -
PriviPK: Certificate-less and secure email communication
( Elsevier Ltd , 2017 , Article)We introduce PriviPK, an infrastructure that is based on a novel combination of certificateless (CL) cryptography and key transparency techniques to enable e2e email encryption. Our design avoids (1) key escrow and deployment ... -
PRMT5-PTEN molecular pathway regulates senescence and self-renewal of primary glioblastoma neurosphere cells
( Nature Publishing Group , 2017 , Article)Glioblastoma (GBM) represents the most common and aggressive histologic subtype among malignant astrocytoma and is associated with poor outcomes because of heterogeneous tumour cell population including mature non-stem-like ... -
PRNU Estimation based on Weighted Averaging for Source Smartphone Video Identification
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Photo response non-uniformity (PRNU) noise is a sensor pattern noise characterizing imperfections in the imaging device. The PRNU is a unique noise for each sensor device, and it has been generally utilized in the literature ... -
PRNU-Net: a Deep Learning Approach for Source Camera Model Identification based on Videos Taken with Smartphone
( Institute of Electrical and Electronics Engineers Inc. , 2022 , Conference Paper)Recent advances in digital imaging have meant that every smartphone has a video camera that can record high-quality video for free and without restrictions. In addition, rapidly developing Internet technology has contributed ... -
Proactive power allocation and caching node selection for regular service guarantees
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)This paper studies the potential of proactive resource allocation to prolong the communication sessions in networks with limited energy budgets and stringent quality-of-service (QoS) requirement, particularly a regular ... -
Proactive spectrum sharing incentive for physical layer security enhancement using outdated CSI
( Institute of Electrical and Electronics Engineers Inc. , 2016 , Article)We investigate the spectrum sharing possibility as an incentive to enhancing the physical layer security. The concept behind this is that a legitimate source-destination pair, communicating in the presence of a passive ...