Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








851 Hits in 6.8 sec

Multimedia security and privacy protection in the internet of things: research developments and challenges

Jiankun Hu, Nickson M. Karie, Song Wang, Wencheng Yang
2022 International Journal of Multimedia Intelligence and Security  
In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT.  ...  The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications.  ...  The third author acknowledges the support from ARC Discovery Grants (DP190103660 and DP200103207) and ARC Linkage Grant (LP180100663).  ... 
doi:10.1504/ijmis.2022.10044461 fatcat:xdliezm2kbe3vkrpgnso74xtba

Privacy and Audiovisual Content: Protecting Users as Big Multimedia Data Grows Bigger [chapter]

Martha Larson, Jaeyoung Choi, Manel Slokom, Zekeriya Erkin, Gerald Friedland, Arjen P. de Vries
2019 Big Data Analytics for Large-Scale Multimedia Search  
Research outputs are distributed six months after their first online publication in the original published version and with proper attribution to the source of the original publication.  ...  In this pilot research outputs of researchers employed by Dutch Universities that comply with the legal requirements of Article 25fa of the Dutch Copyright Act are distributed online and free of cost or  ...  This term was introduced in 2010 in [1] in order to help raise awareness of rapidly emerging privacy threats of big multimedia data online.  ... 
doi:10.1002/9781119376996.ch7 fatcat:bzf26rouajfztj2byn53tg2qui

A Comprehensive Survey on Trustworthy Recommender Systems [article]

Wenqi Fan, Xiangyu Zhao, Xiao Chen, Jingran Su, Jingtong Gao, Lin Wang, Qidong Liu, Yiqi Wang, Han Xu, Lei Chen, Qing Li
2022 arXiv   pre-print
aspects of our lives, especially for various human-oriented online services such as e-commerce platforms and social media sites.  ...  However, recent studies have found that data-driven recommender systems can pose serious threats to users and society, such as spreading fake news to manipulate public opinion in social media sites, amplifying  ...  In this subsection, we will introduce these actions from the following three aspects: Big Model, Edge Computation, and Embedding-Based Retrieval Systems. Big Model.  ... 
arXiv:2209.10117v1 fatcat:p2dc3xywl5hr3eoy4alvxtqbdu

Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges [article]

Bin Jiang, Jianqiang Li, Guanghui Yue, Houbing Song
2021 arXiv   pre-print
In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential privacy in IIoT.  ...  Then we focus on the metrics of industrial data privacy, and analyze the contradiction between data utilization for deep models and individual privacy protection.  ...  In this field, Zhou et al. discussed the multimedia big data retrieval based on edge computing under the differentiallyprivate and trustworthy framework [169] .  ... 
arXiv:2101.10569v2 fatcat:xwebjbcvcjhbbaehajhdfjocia

Beyond the hype: Big data concepts, methods, and analytics

Amir Gandomi, Murtaza Haider
2015 International Journal of Information Management  
Size is the first, and at times, the only dimension that leaps out at the mention of big data.  ...  This paper highlights the need to develop appropriate and efficient analytical methods to leverage massive volumes of heterogeneous data in unstructured text, audio, and video formats.  ...  Acknowledgment The authors would like to acknowledge research and editing support provided by Ms. Ioana Moca.  ... 
doi:10.1016/j.ijinfomgt.2014.10.007 fatcat:i4igglgv2nbvpg26qyo4j4ehcq

An Approach for Time-aware Domain-based Social Influence Prediction [article]

Bilal Abu-Salih, Kit Yan Chan, Omar Al-Kadi, Marwan Al-Tawil, Pornpit Wongthongtham, Tomayess Issa, Heba Saadeh, Malak Al-Hassan, Bushra Bremie, Abdulaziz Albahlal
2020 arXiv   pre-print
Online Social Networks(OSNs) have established virtual platforms enabling people to express their opinions, interests and thoughts in a variety of contexts and domains, allowing legitimate users as well  ...  One of the main reasons for acquiring the value of Social Big Data (SBD) is to provide frameworks and methodologies using which the credibility of OSNs users can be evaluated.  ...  Availability of data and materials Labelled dataset used in this research is publicly available via the following link: http://bit.ly/2WoIXJQ Source funding Authors declare that this research is not  ... 
arXiv:2001.07838v1 fatcat:nrlng3rc7fe5bks6hkskoukwbu

Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications

Kenneth Li Minn Ang, Jasmine Kah Phooi Seng, Ericmoore Ngharamike
2022 Future Internet  
They can be merged to form a new and essential platform in crowdsourcing IoT paradigm for data collection from different sources and communication mediums.  ...  This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT  ...  Sensing tasks are distributed across anonymous participating mobile devices, verified, anonymized, in this participatory sensing mode. Das et al.  ... 
doi:10.3390/fi14020049 fatcat:o62tjaayyvfnjc75irzkpzu5vy

2020 Index IEEE Internet of Things Journal Vol. 7

2020 IEEE Internet of Things Journal  
., and Bose, R., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe  ...  ., +, JIoT Sept. 2020 8902-8916 Differentially Private Tensor Train Decomposition in Edge-Cloud Computing for SDN-Based Internet of Things.  ...  ., +, JIoT July 2020 6266-6278 Differentially Private Tensor Train Decomposition in Edge-Cloud Computing for SDN-Based Internet of Things.  ... 
doi:10.1109/jiot.2020.3046055 fatcat:wpyblbhkrbcyxpnajhiz5pj74a

Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps

2017 KSII Transactions on Internet and Information Systems  
This study reviews the current challenges and open issues in cloud computing, with the focus on autonomic resource management especially in federated clouds.  ...  In addition, this study provides recommendations and research roadmaps for scientific activities, as well as potential improvements in federated cloud computing.  ...  Research challenges and directions have been categorized into 4 groups, namely security and trustworthy, cloud development and benchmarking, big data technologies and cloud computing as well as social  ... 
doi:10.3837/tiis.2017.09.006 fatcat:a7cyj63deveqfnchzdixn5g54e

Technical Research Priorities for Big Data [chapter]

Edward Curry, Sonja Zillner, Andreas Metzger, Arne J. Berre, Sören Auer, Ray Walshe, Marija Despenic, Milan Petkovic, Dumitru Roman, Walter Waterfeld, Robert Seidl, Souleiman Hasan (+2 others)
2021 The Elements of Big Data Value  
The process also highlighted the important role of data standardisation, data engineering and DevOps for Big Data.  ...  The result of the process identified five key technical research priorities in the areas of data management, data processing, data analytics, data visualisation and user interactions, and data protection  ...  computation to Edge computing. • Real-time architectures for data-in-motion: Architectures, frameworks and tools for real-time and on-the-fly processing of data-in-motion (e.g.  ... 
doi:10.1007/978-3-030-68176-0_5 fatcat:c2ydwkla6ngrxfatohkuxqnfm4

A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues

Yehia Ibrahim Alzoubi, Asif Gill, Alok Mishra
2022 Journal of Cloud Computing: Advances, Systems and Applications  
A lack of standards and laws may make it difficult for blockchain and fog computing to be integrated in the future, particularly in light of newly developed technologies like quantum computing and artificial  ...  AbstractThe fog computing concept was proposed to help cloud computing for the data processing of Internet of Things (IoT) applications.  ...  Fernández-Caramés & Fraga-Lamas Survey on BC, IoT, FC and edge computing in universities campuses [207] Iqbal et al. [228] Survey on BC, FC, and trust management in social Internet of vehicles McGhin  ... 
doi:10.1186/s13677-022-00353-y pmid:36438442 pmcid:PMC9676739 fatcat:pvzjspe7bnddvndmcgjnf43fcq

Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems

Vijay Prakash, Alex Williams, Lalit Garg, Claudio Savaglio, Seema Bawa
2021 Electronics  
There are several benefits in exploiting Cloud and Edge computing paradigms, such as lower costs and higher efficiency.  ...  It provides data computation and storage where data are processed, enables better data control, faster understanding and actions, and continuous operation.  ...  PSIRS can remove up to 80% of the stego without affecting the visual appearance and video quality. The authors of [108] analyzed cutting-edge techniques for steganography and steganalysis.  ... 
doi:10.3390/electronics10111229 fatcat:mkutuyvfinhajcmpymcc57zrka

Software architectures for big data: a systematic literature review

Cigdem Avci, Bedir Tekinerdogan, Ioannis N. Athanasiadis
2020 Big Data Analytics  
Big Data systems are often composed of information extraction, preprocessing, processing, ingestion and integration, data analysis, interface and visualization components.  ...  Yet, although many different concerns in big data systems are addressed the notion of architecture seems to be more implicit.  ...  Availability of data and materials All the material is accessible (please see references and the primary studies sections).  ... 
doi:10.1186/s41044-020-00045-1 fatcat:lhwrekad5nd5xdssqky75qy7qq

Web Scraping or Web Crawling: State of Art, Techniques, Approaches and Application

Moaiad Khder
2021 International journal of advances in soft computing and its applications  
Keywords: Web Scraping, Web Crawling, Python Language, Business Intelligence, Data Science, Artificial Intelligence, Big Data, Cloud Computing, Cybersecurity, legal, ethical.  ...  businesses such as drug marketplaces in the darknet to provide law enforcement and researchers valuable data such as drug prices and varieties that would be unavailable with conventional methods.  ...  Introduction For the vast majority of computer users, interaction with the internet comes in the form of accessing websites through a browser, where information and multimedia objects are displayed in  ... 
doi:10.15849/ijasca.211128.11 fatcat:tuia6bo5cfc6dbbwhrjpfzlx2m

A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling Technologies,and Challenges [article]

Minrui Xu, Wei Chong Ng, Wei Yang Bryan Lim, Jiawen Kang, Zehui Xiong, Dusit Niyato, Qiang Yang, Xuemin Sherman Shen, Chunyan Miao
2022 arXiv   pre-print
Moreover, given the high computation costs required, e.g., to render 3D virtual worlds and run data-hungry artificial intelligence-driven avatars, we discuss the computation challenges and cloud-edge-end  ...  to manage physical edge resources in a decentralized, transparent, and immutable manner.  ...  computing resources, and ensure the integrity and authenticity of Big Data.  ... 
arXiv:2203.05471v2 fatcat:jhl66faxw5clnopsb5rbsopzoq
« Previous Showing results 1 — 15 out of 851 results