A bio-inspired privacy-preserving framework for healthcare systems
暂无分享,去创建一个
Fadi Al-Turjman | Achyut Shankar | Atul Kumar Srivastava | Chandramohan Dhasarathan | Manish Kumar | Manoj Kumar | M. Kumar | Manish Kumar | F. Al-turjman | A. Shankar | Chandramohan Dhasarathan | A. Srivastava
[1] Xiaolong Xu,et al. Privacy-preserving and sparsity-aware location-based prediction method for collaborative recommender systems , 2019, Future Gener. Comput. Syst..
[2] Pierre Pinson,et al. A critical overview of privacy-preserving approaches for collaborative forecasting , 2021, International Journal of Forecasting.
[3] L. D. Dhinesh Babu,et al. Honey bee behavior inspired load balancing of tasks in cloud computing environments , 2013, Appl. Soft Comput..
[4] Gang Liu,et al. TPSense: A Framework for Event-Reports Trustworthiness Evaluation in Privacy-Preserving Vehicular Crowdsensing Systems , 2020 .
[5] Manimaran Govindarasu,et al. An Efficient Framework for Privacy-Preserving Computations on Encrypted IoT Data , 2020, IEEE Internet of Things Journal.
[6] Dervis Karaboga,et al. AN IDEA BASED ON HONEY BEE SWARM FOR NUMERICAL OPTIMIZATION , 2005 .
[7] Mehran Abolhasan,et al. PrivySharing: A blockchain-based framework for privacy-preserving and secure data sharing in smart cities , 2020, Comput. Secur..
[8] Keping Yu,et al. A blockchain-empowered AAA scheme in the large-scale HetNet , 2020, Digit. Commun. Networks.
[9] Yuanman Li,et al. Privacy-Preserving distributed deep learning based on secret sharing , 2020, Inf. Sci..
[10] Abdulrahman Alamer,et al. An efficient truthfulness privacy-preserving tendering framework for vehicular fog computing , 2020, Eng. Appl. Artif. Intell..
[11] Dongxi Liu,et al. A Trustworthy Privacy Preserving Framework for Machine Learning in Industrial IoT Systems , 2020, IEEE Transactions on Industrial Informatics.
[12] Wei Wei,et al. Fault-tolerant monitor placement for out-of-band wireless sensor network monitoring , 2012, Ad Hoc Networks.
[13] Wenzhong Li,et al. Energy saving strategies for cooperative cache replacement in mobile ad hoc networks , 2009, Pervasive Mob. Comput..
[14] Xuefeng Zheng,et al. User stateless privacy-preserving TPA auditing scheme for cloud storage , 2019, J. Netw. Comput. Appl..
[15] Tirth Patel,et al. Data privacy in construction industry by privacy-preserving data mining (PPDM) approach , 2020, Asian Journal of Civil Engineering.
[16] Xiaodong Lin,et al. SPOC: A Secure and Privacy-Preserving Opportunistic Computing Framework for Mobile-Healthcare Emergency , 2013, IEEE Transactions on Parallel and Distributed Systems.
[17] Abderrazak Jemai,et al. Accountable privacy preserving attribute based framework for authenticated encrypted access in clouds , 2020, J. Parallel Distributed Comput..
[18] Yin-Fu Huang,et al. Global Data Allocation Based on User Behaviors in Mobile Computing Environments , 2006, 2006 International Symposium on Communications and Information Technologies.
[19] Benjamin C. M. Fung,et al. SecDM\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\textsf {SecDM}}$$\end{document}: privacy-preserving data outsou , 2019, Knowledge and Information Systems.
[20] Yi Mu,et al. Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid , 2020, IEEE Access.
[21] Liang Gao,et al. Honey bees mating optimization algorithm for process planning problem , 2014, J. Intell. Manuf..
[22] Stan Kurkovsky. Multimodality in Mobile Computing and Mobile Devices: Methods for Adaptable Usability , 2009 .
[23] Nicolas Gama,et al. Privacy-preserving semi-parallel logistic regression training with fully homomorphic encryption , 2020, BMC Medical Genomics.
[24] Benjamin Turnbull,et al. A Privacy-Preserving-Framework-Based Blockchain and Deep Learning for Protecting Smart Power Networks , 2020, IEEE Transactions on Industrial Informatics.
[25] Laurence T. Yang,et al. Privacy-preserving computation in cyber-physical-social systems: A survey of the state-of-the-art and perspectives , 2020, Inf. Sci..
[26] Bharat K. Bhargava,et al. Performance Evaluation of Multiple-Rate Mobile Wireless Ad Hoc Networks , 2006 .
[27] M.A.P. Chamikara,et al. Privacy Preserving Face Recognition Utilizing Differential Privacy , 2020, Comput. Secur..
[28] Golda Dilip,et al. RETRACTED ARTICLE: An efficient privacy preserving on high-order heterogeneous data using fuzzy K-prototype clustering , 2020, Journal of Ambient Intelligence and Humanized Computing.
[29] Yu Zhou,et al. Privacy preserving distributed data mining based on secure multi-party computation , 2020, Comput. Commun..
[30] Xun Yi,et al. Towards privacy preserving AI based composition framework in edge networks using fully homomorphic encryption , 2020, Eng. Appl. Artif. Intell..
[31] Liuqing Yang,et al. Sparse Vector Coding-Based Multi-Carrier NOMA for In-Home Health Networks , 2021, IEEE Journal on Selected Areas in Communications.
[32] Yulei Wu,et al. A privacy preserved and credible network protocol , 2019, J. Parallel Distributed Comput..
[33] Sundaram Suresh,et al. Meta-cognitive RBF Network and its Projection Based Learning algorithm for classification problems , 2013, Appl. Soft Comput..
[34] Wouter Joosen,et al. Cloud and edge based data analytics for privacy-preserving multi-modal engagement monitoring in the classroom , 2020, Inf. Syst. Frontiers.
[35] Rongxing Lu,et al. Adaptive privacy-preserving federated learning , 2020, Peer-to-Peer Networking and Applications.
[36] Marcelo Dias de Amorim,et al. Push-and-track: Saving infrastructure bandwidth through opportunistic forwarding , 2012, Pervasive Mob. Comput..
[37] D. Chandramohan. Bio comp A Bio inspired Opportunistic Computing Framework for Cooperative Problem Solving Environments , 2014 .
[38] Keping Yu,et al. Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV , 2020, IEEE Transactions on Vehicular Technology.
[39] Leïla Azouz Saïdane,et al. Privacy-preserving aware data transmission for IoT-based e-health , 2019, Comput. Networks.
[40] Tasos Dagiuklas,et al. Modeling human mobility in obstacle-constrained ad hoc networks , 2012, Ad Hoc Networks.
[41] Guojun Wang,et al. An Edge Computing-enhanced Internet of Things Framework for Privacy-preserving in Smart City , 2020, Comput. Electr. Eng..
[42] Antonio F. Gómez-Skarmeta,et al. ARIES: Evaluation of a reliable and privacy-preserving European identity management framework , 2020, Future Gener. Comput. Syst..
[43] Nankun Mu,et al. Privacy preserving frequent itemset mining: Maximizing data utility based on database reconstruction , 2019, Comput. Secur..
[44] Xuebin Ma,et al. A privacy-preserving group decision making expert system for medical diagnosis based on dynamic knowledge base , 2020 .