Zobrazeno 1 - 10
of 302
pro vyhledávání: '"Secure outsourcing"'
Autor:
Yanxin Liu, Qianqian Su
Publikováno v:
IEEE Access, Vol 12, Pp 48881-48897 (2024)
The Transformer model has emerged as a prominent machine learning tool within the field of natural language processing. Nevertheless, running the Transformer model on resource-constrained devices presents a notable challenge that needs to be addresse
Externí odkaz:
https://doaj.org/article/b6581a50558f40ab9f9412dc73f2993c
Autor:
Sara Jafarbeiki, Amin Sakzad, Ron Steinfeld, Shabnam Kasra Kermanshahi, Chandra Thapa, Yuki Kume
Publikováno v:
Heliyon, Vol 10, Iss 8, Pp e29399- (2024)
In this paper, we introduce ACE, a consent-embedded searchable encryption scheme. ACE enables dynamic consent management by supporting the physical deletion of associated data at the time of consent revocation. This ensures instant real deletion of d
Externí odkaz:
https://doaj.org/article/83abfcfed6ea474687dfa0bdff8e2d02
Autor:
Jia Liu, Wang Yinchai, Fengrui Wei, Qing Han, Yunting Tao, Liping Zhao, Xinjin Li, Hongbo Sun
Publikováno v:
IEEE Access, Vol 11, Pp 109027-109037 (2023)
As one fundamental data-mining problem, ANN (approximate nearest neighbor search) is widely used in many industries including computer vision, information retrieval, and recommendation system. $LSH$ (Local sensitive hashing) is one of the most popula
Externí odkaz:
https://doaj.org/article/1378a8fd29374dba90825023694ef2d2
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
IEEE Access, Vol 10, Pp 39407-39423 (2022)
Although tremendous revolution has been made in the emerging cloud computing technologies over digital devices, privacy gradually becomes a big concern in outsourcing computation. Homomorphic encryption has been proposed to facilitate the preservatio
Externí odkaz:
https://doaj.org/article/fa65a7f3eef9428daa8b56ecac4a1909
Autor:
Yu Ishimaki, Hayato Yamana
Publikováno v:
IEEE Access, Vol 9, Pp 53061-53077 (2021)
Homomorphic encryption enables computations over encrypted data without decryption, and can be used for outsourcing computations to some untrusted source. In homomorphic encryption based on the hardness of ring-learning with errors, offering promisin
Externí odkaz:
https://doaj.org/article/334d96511aea4278b884dcdc1a3d9c83
Publikováno v:
Applied Sciences, Vol 13, Iss 6, p 3439 (2023)
In the medical field, with the increasing number of medical images, medical image classification has become a hot spot. The convolutional neural network, a technology that can process more images and extract more accurate features with nonlinear mode
Externí odkaz:
https://doaj.org/article/4c3e7099560f443abbb48c30c44d05a1
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Sara Jafarbeiki, Amin Sakzad, Shabnam Kasra Kermanshahi, Raj Gaire, Ron Steinfeld, Shangqi Lai, Gad Abraham, Chandra Thapa
Publikováno v:
Informatics in Medicine Unlocked, Vol 31, Iss , Pp 100988- (2022)
Privacy and security issues limit the query executions over genomics datasets, notably single nucleotide polymorphisms (SNPs), raised by the sensitivity of this type of data. Therefore, it is important to ensure that executing queries on these datase
Externí odkaz:
https://doaj.org/article/1c6e8f8ebdbb48999a2db262b990c12e