標題: Titlebook: Security, Privacy and Data Analytics; Select Proceedings o Udai Pratap Rao,Sankita J. Patel,Andrea Visconti Conference proceedings 2022 The [打印本頁] 作者: 平凡人 時間: 2025-3-21 20:00
書目名稱Security, Privacy and Data Analytics影響因子(影響力)
書目名稱Security, Privacy and Data Analytics影響因子(影響力)學(xué)科排名
書目名稱Security, Privacy and Data Analytics網(wǎng)絡(luò)公開度
書目名稱Security, Privacy and Data Analytics網(wǎng)絡(luò)公開度學(xué)科排名
書目名稱Security, Privacy and Data Analytics被引頻次
書目名稱Security, Privacy and Data Analytics被引頻次學(xué)科排名
書目名稱Security, Privacy and Data Analytics年度引用
書目名稱Security, Privacy and Data Analytics年度引用學(xué)科排名
書目名稱Security, Privacy and Data Analytics讀者反饋
書目名稱Security, Privacy and Data Analytics讀者反饋學(xué)科排名
作者: 驚惶 時間: 2025-3-21 23:19
A Review on Data Integrity Verification Schemes Based on TPA and Blockchain for Secure Cloud Data S or commodity in ensuring the data for the Data Owner on the remote or cloud-based storage. In this paper, the authors have endeavored to carry out a comprehensive survey of all such efficient solutions proposed to verify the integrity of data involving the use and non-usage of Blockchain in a cloud-based storage system.作者: 浪費時間 時間: 2025-3-22 04:24
Multi-model Emotion Recognition Using Hybrid Framework of Deep and Machine Learning,VM, Decision tree, Random forest, and XGBoost) are used to develop an emotion recognition model using the deep learning-based features. The best weighted-accuracy (WA) and unweighted-accuracy (UWA) are 71 and 66%, respectively, using Random forest classifier with the combination speech, text, and mocap.作者: Certainty 時間: 2025-3-22 05:14 作者: 大量 時間: 2025-3-22 10:52
Privacy Preservation Techniques and Models for Publishing Structured Data, it is necessary to protect the sensitive information of users before publishing. In this paper, the main focus is on the fundamentals of privacy preservation and review of literature where authors have recommended various methods to offer privacy to sensitive data of users.作者: 蚊子 時間: 2025-3-22 16:58
Conference proceedings 2022 from researchers across industry and academia working in security, privacy, and data analytics from technological and social perspectives. The book will serve as a valuable reference resource for academics and researchers across the globe..作者: 極少 時間: 2025-3-22 17:03
1876-1100 vancements in the field of security and privacy.Serves as a .This book constitutes refereed proceedings of the International Conference on Security, Privacy and Data Analytics, ISPDA 2021. The volume covers a wide range of topics, including big data and analytics, cloud security and privacy, data in作者: PIZZA 時間: 2025-3-23 01:11 作者: calorie 時間: 2025-3-23 03:07
Safeguarding GeoLocation for Social Media with Local Differential Privacy and L-Diversity,sure of trends, business, political situation of a particular location, etc., which if exposed can harm the privacy of the user. In this work, we want to secure the privacy of the Geolocation data of a user with the help of Local Differential privacy and l-diversity. Local Differential Privacy (Loca作者: 縮減了 時間: 2025-3-23 07:16
Detection of False Data Injection Cyber-Attack in Smart Grid by Convolutional Neural Network-Based ng smart grid operations. At the same time, it is getting more vulnerable to cyberattack such as False Data Injection Attack (FDIA). The critical control process of smart power grid depends on correct State Estimation (SE). A FDIA targets the measurements which are used to calculate SE, thus result 作者: Fortify 時間: 2025-3-23 13:32
Democratic Aftermarket for Domain Names,adopted technique is to buy from someone through the secondary market and brokers. However, the existing solutions for the secondary market of domain names are centralized and demand huge commission fee. This paper presents a secure, decentralized, and cheaper platform for buying and selling afterma作者: NICE 時間: 2025-3-23 16:54
Defect Analysis of Faulty Regions in Photovoltaic Panels Using Deep Learning Method, solar cells has gained substantial attention from companies as well as from commercial establishments and the demand grows exponentially. In order to obtain maximum radiation, Solar cells are exposed to continuous and extreme atmospheric conditions which leads to frequent failures or even disruptio作者: 無思維能力 時間: 2025-3-23 21:29
Multimodal Biometric Authentication Using Watermarking Technique,es, veins, typing styles gaits, and voices. Uni-modal BS does not have improved protection or recognition accuracy, so multi-modal BS is implemented. However, multi-modal BS has several disadvantages, including intra-class differences, non-universality, Spoof attacks, and distinctiveness. To address作者: 逢迎春日 時間: 2025-3-24 01:59 作者: 大包裹 時間: 2025-3-24 05:37
Detecting Stegomalware: Malicious Image Steganography and Its Intrusion in Windows,ages pose a potential threat due to their massive use, innocuous appearance, and ability to hide data without noticeably degrading the quality. Detecting malicious image steganography is a challenge for intrusion detection systems or static detection that lack analyzing the pixels of an image. This 作者: Truculent 時間: 2025-3-24 09:01 作者: 哥哥噴涌而出 時間: 2025-3-24 12:28
Media House Bias Prediction Using Deep Learning Framework, and how they are covered. Our goal is to create a system that can detect media bias. An end-to-end pipeline is being constructed to achieve this goal, which involves training the model to determine whether or not an article is biased. So, first of all we determined the ground truth for any specific作者: 拘留 時間: 2025-3-24 18:09 作者: Overthrow 時間: 2025-3-24 20:49
Multi-model Emotion Recognition Using Hybrid Framework of Deep and Machine Learning,-bot, all requiring an understanding of emotional psychology. Emotion is identified by various sources of emotion such as text, images, gesture, and video. The fusion process of various sources of information is called .. In the proposed framework, a multi-model deep neural network is trained and fu作者: 成績上升 時間: 2025-3-24 23:47
Decentralized and Secured Voting System with Blockchain Technology,llot paper voting system, postal ballots and EVM system. All the mentioned systems do not ensure the safety of the votes and the trust that the voters have to put in. A Blockchain is a cryptographically connected peer-to-peer network of computers called nodes. Blockchain is the decentralized distrib作者: 善變 時間: 2025-3-25 07:08
Network Traffic Classification Using Deep Autonomous Learning Approach, Service (DDoS) attacks is one such threats that deny services to legitimate users. This necessitates a system for classifying DDoS attacks to protect the computing services provided to legitimate users. Recently, deep learning techniques have been proposed to detect DDoS attacks. The existing deep 作者: Barter 時間: 2025-3-25 08:05 作者: DUCE 時間: 2025-3-25 14:01
Privacy Preservation Techniques and Models for Publishing Structured Data,llected data are useful for the development of various applications, business upliftment, providing better services, and to the research firms. However, it is likely to increase the possibility of security breaches and disclosing the private information of users. To take advantage of available data,作者: 我怕被刺穿 時間: 2025-3-25 16:18 作者: osteoclasts 時間: 2025-3-25 20:22 作者: KIN 時間: 2025-3-26 00:10
Decentralized Blockchain-Based Framework for Securing Review System,itality, e-commerce, government portals, etc. But, the existing review systems are centralized and bring about a lot of shortcomings in terms of reliability, transparency, and trustworthiness. With this research work, we are trying to address some of the existing lacunae in the current review system作者: 不理會 時間: 2025-3-26 06:54
Hindi Songs Genre Classification Using Deep Learning,epresentation based on the local spatial dependencies from the pre-processed audio (for example, Chroma, Pitch, Mel-spectrogram, and MFCC). The LSTM layer, then, captures the sequential behavior. An attention layer is used to signify the important sub-part in the LSTM output. The best results are obtained using MFCC features.作者: menopause 時間: 2025-3-26 09:18
Conference proceedings 2022ide range of topics, including big data and analytics, cloud security and privacy, data intelligence, hardware security, network security, blockchain technology and distributed ledger, machine learning for security, and many others. The volume includes novel contributions and the latest developments作者: 大量殺死 時間: 2025-3-26 14:42 作者: Progesterone 時間: 2025-3-26 19:16
Media House Bias Prediction Using Deep Learning Framework,(LSTM) are used for prediction and give a promising accuracy = 35.69% and 37.99%, respectively. We have taken different types of bias into consideration such as bias by spin and bias by omission. Also, we have considered biasness toward or against different entities such as political parties and leaders.作者: Synthesize 時間: 2025-3-26 23:45 作者: Prosaic 時間: 2025-3-27 03:18 作者: Instantaneous 時間: 2025-3-27 08:18 作者: WAIL 時間: 2025-3-27 12:36
Udai Pratap Rao,Sankita J. Patel,Andrea ViscontiComprises peer-reviewed papers presented during the International Conference on Security, Privacy and Data Analytics.Covers technological advancements in the field of security and privacy.Serves as a 作者: 殘廢的火焰 時間: 2025-3-27 16:50 作者: FRAX-tool 時間: 2025-3-27 19:35
https://doi.org/10.1007/978-981-16-9089-1Access Control; Authentication and Authorization; Anonymity; Application Security; Attacks and Defenses; 作者: 典型 時間: 2025-3-28 00:20
Alok Jaiswal,Sheetal Chandel,Ajit Muzumdar,Chirag Modi,Madhu G. M.,C. Vyjayanthi作者: 面包屑 時間: 2025-3-28 02:43 作者: Gustatory 時間: 2025-3-28 06:39
Sahil Nande,Saail Ganesh,Santosh Krishnan,Kalyani Pampattiwar作者: 苦澀 時間: 2025-3-28 14:24 作者: 表主動 時間: 2025-3-28 17:47
Vikash Kumar,Ashish Ranjan,Md Shah Fahad,Akshay Deepak作者: mydriatic 時間: 2025-3-28 19:10 作者: CRUMB 時間: 2025-3-29 01:18
Md Shah Fahad,Aparna Juhi,Shambhavi,Ashish Ranjan,Akshay Deepak作者: 觀點 時間: 2025-3-29 04:32
Rishikesh Choudhari,M. Shivakumar,Shreyas Nandavar,Shruti Maigur,Saroja V. Siddamal,Suneeta V. Budih作者: STENT 時間: 2025-3-29 11:01 作者: 不合 時間: 2025-3-29 12:51 作者: 皺痕 時間: 2025-3-29 17:42 作者: homocysteine 時間: 2025-3-29 23:16
Detection of False Data Injection Cyber-Attack in Smart Grid by Convolutional Neural Network-Based ) are prepared, tuned and their performance are tested. Some Deep Learning (DL)-based models, e.g., Convolutional Neural Network (CNN), Artificial Neural Network (ANN) are also experimented with. The CNN models show better results, so a number of configurations are tested on. Finally, a CNN-based mo作者: 數(shù)量 時間: 2025-3-30 02:59 作者: 合并 時間: 2025-3-30 08:02
Multimodal Biometric Authentication Using Watermarking Technique,mbining the feature, feature level fusion is used. The main concept of proposed technique is to use a fingerprint image and demographic data to watermark an individual‘s face and finger vein image. For embedding the watermark, PSO is used to select the best Discrete Cosine Transform (DCT) coefficien作者: OCTO 時間: 2025-3-30 09:58 作者: sparse 時間: 2025-3-30 13:00 作者: 來自于 時間: 2025-3-30 18:35 作者: gratify 時間: 2025-3-30 23:55 作者: motivate 時間: 2025-3-31 02:39 作者: oxidize 時間: 2025-3-31 06:47
1876-1100 ytics from technological and social perspectives. The book will serve as a valuable reference resource for academics and researchers across the globe..978-981-16-9091-4978-981-16-9089-1Series ISSN 1876-1100 Series E-ISSN 1876-1119 作者: glowing 時間: 2025-3-31 09:36
Contextual Analysis as Support for Successful Innovation in Complex Environmentsccess of innovative practice. They then discuss a role for contextual analysis as the means to target individual engagement, and present an example of a method which could be used to conduct such analysis.作者: plasma-cells 時間: 2025-3-31 14:40 作者: Esalate 時間: 2025-3-31 18:24 作者: Antagonist 時間: 2025-4-1 00:24 作者: 蒼白 時間: 2025-4-1 04:28
Analysis of Bee Population and the Relationship with Time time. Find possible factors that affect bee populations: External and internal factors were identified through a literature review of research articles and reputable online sources. Among these, five factors were deemed the most critical and to be used in this chapter later. Assign weights to each 作者: clarify 時間: 2025-4-1 08:14 作者: 哀悼 時間: 2025-4-1 10:10
Abgeltungsteuer im Kurzüberblicklang geltenden Regeln zur Kapitalertragbesteuerung und die grunds?tzliche Deklarationspflicht für private Kapitaleinkünfte in der Steuererkl?rung. Gleichzeitig wurde die Besteuerung von ebenfalls bis dato der Deklarationspflicht unterliegenden privaten Wertpapierver?u?erungsgesch?ften und von als Fi作者: JUST 時間: 2025-4-1 14:41 作者: evanescent 時間: 2025-4-1 22:34