A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Multimedia security and privacy protection in the internet of things: research developments and challenges
2022
International Journal of Multimedia Intelligence and Security
In this paper, we conduct a comprehensive survey on multimedia data security and privacy protection in the IoT. ...
The security and privacy of multimedia data have, however, emerged as key challenges that have the potential to impact the successful deployment of IoT devices in some data-sensitive applications. ...
The third author acknowledges the support from ARC Discovery Grants (DP190103660 and DP200103207) and ARC Linkage Grant (LP180100663). ...
doi:10.1504/ijmis.2022.10044461
fatcat:xdliezm2kbe3vkrpgnso74xtba
Privacy and Audiovisual Content: Protecting Users as Big Multimedia Data Grows Bigger
[chapter]
2019
Big Data Analytics for Large-Scale Multimedia Search
Research outputs are distributed six months after their first online publication in the original published version and with proper attribution to the source of the original publication. ...
In this pilot research outputs of researchers employed by Dutch Universities that comply with the legal requirements of Article 25fa of the Dutch Copyright Act are distributed online and free of cost or ...
This term was introduced in 2010 in [1] in order to help raise awareness of rapidly emerging privacy threats of big multimedia data online. ...
doi:10.1002/9781119376996.ch7
fatcat:bzf26rouajfztj2byn53tg2qui
A Comprehensive Survey on Trustworthy Recommender Systems
[article]
2022
arXiv
pre-print
aspects of our lives, especially for various human-oriented online services such as e-commerce platforms and social media sites. ...
However, recent studies have found that data-driven recommender systems can pose serious threats to users and society, such as spreading fake news to manipulate public opinion in social media sites, amplifying ...
In this subsection, we will introduce these actions from the following three aspects: Big Model, Edge Computation, and Embedding-Based Retrieval Systems.
Big Model. ...
arXiv:2209.10117v1
fatcat:p2dc3xywl5hr3eoy4alvxtqbdu
Differential Privacy for Industrial Internet of Things: Opportunities, Applications and Challenges
[article]
2021
arXiv
pre-print
In this paper, we conduct a comprehensive survey on the opportunities, applications and challenges of differential privacy in IIoT. ...
Then we focus on the metrics of industrial data privacy, and analyze the contradiction between data utilization for deep models and individual privacy protection. ...
In this field, Zhou et al. discussed the multimedia big data retrieval based on edge computing under the differentiallyprivate and trustworthy framework [169] . ...
arXiv:2101.10569v2
fatcat:xwebjbcvcjhbbaehajhdfjocia
Beyond the hype: Big data concepts, methods, and analytics
2015
International Journal of Information Management
Size is the first, and at times, the only dimension that leaps out at the mention of big data. ...
This paper highlights the need to develop appropriate and efficient analytical methods to leverage massive volumes of heterogeneous data in unstructured text, audio, and video formats. ...
Acknowledgment The authors would like to acknowledge research and editing support provided by Ms. Ioana Moca. ...
doi:10.1016/j.ijinfomgt.2014.10.007
fatcat:i4igglgv2nbvpg26qyo4j4ehcq
An Approach for Time-aware Domain-based Social Influence Prediction
[article]
2020
arXiv
pre-print
Online Social Networks(OSNs) have established virtual platforms enabling people to express their opinions, interests and thoughts in a variety of contexts and domains, allowing legitimate users as well ...
One of the main reasons for acquiring the value of Social Big Data (SBD) is to provide frameworks and methodologies using which the credibility of OSNs users can be evaluated. ...
Availability of data and materials Labelled dataset used in this research is publicly available via the following link: http://bit.ly/2WoIXJQ
Source funding Authors declare that this research is not ...
arXiv:2001.07838v1
fatcat:nrlng3rc7fe5bks6hkskoukwbu
Towards Crowdsourcing Internet of Things (Crowd-IoT): Architectures, Security and Applications
2022
Future Internet
They can be merged to form a new and essential platform in crowdsourcing IoT paradigm for data collection from different sources and communication mediums. ...
This paper presents a comprehensive survey for this new Crowdsourcing IoT paradigm from four different perspectives: (1) Architectures for Crowd-IoT; (2) Trustworthy, Privacy and Security for Crowd-IoT ...
Sensing tasks are distributed across anonymous participating mobile devices, verified, anonymized, in this participatory sensing mode. Das et al. ...
doi:10.3390/fi14020049
fatcat:o62tjaayyvfnjc75irzkpzu5vy
2020 Index IEEE Internet of Things Journal Vol. 7
2020
IEEE Internet of Things Journal
., and Bose, R., Rateless-Code-Based Secure Cooperative Transmission Scheme for Industrial IoT; JIoT July 2020 6550-6565 Jamalipour, A., see Murali, S., JIoT Jan. 2020 379-388 James, L.A., see Wanasinghe ...
., +, JIoT Sept. 2020 8902-8916 Differentially Private Tensor Train Decomposition in Edge-Cloud Computing for SDN-Based Internet of Things. ...
., +, JIoT July 2020 6266-6278 Differentially Private Tensor Train Decomposition in Edge-Cloud Computing for SDN-Based Internet of Things. ...
doi:10.1109/jiot.2020.3046055
fatcat:wpyblbhkrbcyxpnajhiz5pj74a
Adaptive Resource Management and Provisioning in the Cloud Computing: A Survey of Definitions, Standards and Research Roadmaps
2017
KSII Transactions on Internet and Information Systems
This study reviews the current challenges and open issues in cloud computing, with the focus on autonomic resource management especially in federated clouds. ...
In addition, this study provides recommendations and research roadmaps for scientific activities, as well as potential improvements in federated cloud computing. ...
Research challenges and directions have been categorized into 4 groups, namely security and trustworthy, cloud development and benchmarking, big data technologies and cloud computing as well as social ...
doi:10.3837/tiis.2017.09.006
fatcat:a7cyj63deveqfnchzdixn5g54e
Technical Research Priorities for Big Data
[chapter]
2021
The Elements of Big Data Value
The process also highlighted the important role of data standardisation, data engineering and DevOps for Big Data. ...
The result of the process identified five key technical research priorities in the areas of data management, data processing, data analytics, data visualisation and user interactions, and data protection ...
computation to Edge computing. • Real-time architectures for data-in-motion: Architectures, frameworks and tools for real-time and on-the-fly processing of data-in-motion (e.g. ...
doi:10.1007/978-3-030-68176-0_5
fatcat:c2ydwkla6ngrxfatohkuxqnfm4
A systematic review of the purposes of Blockchain and fog computing integration: classification and open issues
2022
Journal of Cloud Computing: Advances, Systems and Applications
A lack of standards and laws may make it difficult for blockchain and fog computing to be integrated in the future, particularly in light of newly developed technologies like quantum computing and artificial ...
AbstractThe fog computing concept was proposed to help cloud computing for the data processing of Internet of Things (IoT) applications. ...
Fernández-Caramés & Fraga-Lamas Survey on BC, IoT, FC and edge computing in universities campuses [207] Iqbal et al. [228] Survey on BC, FC, and trust management in social Internet of vehicles McGhin ...
doi:10.1186/s13677-022-00353-y
pmid:36438442
pmcid:PMC9676739
fatcat:pvzjspe7bnddvndmcgjnf43fcq
Cloud and Edge Computing-Based Computer Forensics: Challenges and Open Problems
2021
Electronics
There are several benefits in exploiting Cloud and Edge computing paradigms, such as lower costs and higher efficiency. ...
It provides data computation and storage where data are processed, enables better data control, faster understanding and actions, and continuous operation. ...
PSIRS can remove up to 80% of the stego without affecting the visual appearance and video quality. The authors of [108] analyzed cutting-edge techniques for steganography and steganalysis. ...
doi:10.3390/electronics10111229
fatcat:mkutuyvfinhajcmpymcc57zrka
Software architectures for big data: a systematic literature review
2020
Big Data Analytics
Big Data systems are often composed of information extraction, preprocessing, processing, ingestion and integration, data analysis, interface and visualization components. ...
Yet, although many different concerns in big data systems are addressed the notion of architecture seems to be more implicit. ...
Availability of data and materials All the material is accessible (please see references and the primary studies sections). ...
doi:10.1186/s41044-020-00045-1
fatcat:lhwrekad5nd5xdssqky75qy7qq
Web Scraping or Web Crawling: State of Art, Techniques, Approaches and Application
2021
International journal of advances in soft computing and its applications
Keywords: Web Scraping, Web Crawling, Python Language, Business Intelligence, Data Science, Artificial Intelligence, Big Data, Cloud Computing, Cybersecurity, legal, ethical. ...
businesses such as drug marketplaces in the darknet to provide law enforcement and researchers valuable data such as drug prices and varieties that would be unavailable with conventional methods. ...
Introduction For the vast majority of computer users, interaction with the internet comes in the form of accessing websites through a browser, where information and multimedia objects are displayed in ...
doi:10.15849/ijasca.211128.11
fatcat:tuia6bo5cfc6dbbwhrjpfzlx2m
A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling Technologies,and Challenges
[article]
2022
arXiv
pre-print
Moreover, given the high computation costs required, e.g., to render 3D virtual worlds and run data-hungry artificial intelligence-driven avatars, we discuss the computation challenges and cloud-edge-end ...
to manage physical edge resources in a decentralized, transparent, and immutable manner. ...
computing resources, and ensure the integrity and authenticity of Big Data. ...
arXiv:2203.05471v2
fatcat:jhl66faxw5clnopsb5rbsopzoq
« Previous
Showing results 1 — 15 out of 851 results