Zobrazeno 1 - 10
of 30
pro vyhledávání: '"Alsharif Abuadbba"'
Autor:
Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng
Publikováno v:
Sensors, Vol 23, Iss 9, p 4346 (2023)
The use of artificial intelligence (AI) to detect phishing emails is primarily dependent on large-scale centralized datasets, which has opened it up to a myriad of privacy, trust, and legal issues. Moreover, organizations have been loath to share ema
Externí odkaz:
https://doaj.org/article/88e5af244f0c4f2787df4021478b5f5b
Publikováno v:
Sensors, Vol 21, Iss 2, p 537 (2021)
One of the major concerns in wireless sensor networks (WSNs) is most of the sensor nodes are powered through limited lifetime of energy-constrained batteries, which majorly affects the performance, quality, and lifetime of the network. Therefore, div
Externí odkaz:
https://doaj.org/article/a8972b72494446fda72820cf3d548bf0
Publikováno v:
IEEE Transactions on Intelligent Transportation Systems. :1-11
Publikováno v:
IEEE Transactions on Sustainable Computing. 8:32-42
Publikováno v:
IEEE Transactions on Parallel and Distributed Systems. 33:3460-3477
The diversity and quantity of data warehouses, gathering data from distributed devices such as mobile devices, can enhance the success and robustness of machine learning algorithms. Federated learning enables distributed participants to collaborative
Publikováno v:
IEEE Internet of Things Journal. 9:12209-12218
Publikováno v:
Future Generation Computer Systems. 127:473-486
Differential privacy (DP) remains a potent solution to what is arguably the defining issue in machine learning: balancing user privacy with an ever-increasing need for data. Practitioners must respect privacy, especially in sensitive healthcare domai
Publikováno v:
IEEE Transactions on Information Forensics and Security. 17:1099-1114
Autor:
Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe
Publikováno v:
Proceedings 2023 Network and Distributed System Security Symposium.
Location trajectories collected by smartphones and other devices represent a valuable data source for applications such as location-based services. Likewise, trajectories have the potential to reveal sensitive information about individuals, e.g., rel
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::87c0c8af551b8065f81bc66aa6d36473
http://arxiv.org/abs/2210.09375
http://arxiv.org/abs/2210.09375