A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
Filters
Blockchain-Enabled Federated Learning for UAV Edge Computing Network: Issues and Solutions
2022
IEEE Access
Compared to traditional machine learning, federated learning requires a decentralized distribution system to enhance trust for UAVs. ...
However, this technique raises privacy concerns about patients' health data. More recently, the concept of federal learning (FL) has been set up to protect mobile user data privacy. ...
ACKNOWLEDGMENT This work was supported by the National Natural Science Foundation of China (No. 61761007) and the Scientific Research Project of Guangxi University Xingjian College of Science and Liberal ...
doi:10.1109/access.2022.3174865
fatcat:gkleclw5b5fwneylx2mhxerjnm
Edge Computing and Its Convergence with Blockchain in 5G and Beyond: Security, Challenges, and Opportunities
2020
IEEE Access
PRIVACY AND SECURITY Whenever a customer makes a transaction the blockchain will provide privacy and secrecy to the personal data of the user. ...
Security and privacy of fog-based scenarios. Controlled data sharing in multi-providers scenarios. Integrity for multi-provider multi-source computations. Data confidentiality and virtualization. ...
doi:10.1109/access.2020.3037108
fatcat:iksoyfx7nbhfrefnzgf6uxuw4q
Regulating a Revolution: From Regulatory Sandboxes to Smart Regulation
2017
Social Science Research Network
FinTech firms and data-driven financial service providers profoundly challenge the current regulatory paradigm. ...
FinTech firms and data-driven financial service providers profoundly challenge the current regulatory paradigm. ...
those on data privacy, and other potential barriers to innovation. ...
doi:10.2139/ssrn.3018534
fatcat:3ubzrww2vzfxdc667oxhfqmsxa
From the Oceans to the Cloud: Opportunities and Challenges for Data, Models, Computation and Workflows
2019
Frontiers in Marine Science
Future uses of the cloud via computational sandboxes and the practicalities and considerations of using the cloud to archive data are explored. ...
In conclusion, visions of a future where cloud computing is ubiquitous are discussed. ...
ACKNOWLEDGMENTS The authors wish to thank both of our reviewers and Alison Appling and Ellyn Montgomery for thorough reviews and helpful suggestions which strongly benefited the manuscript. ...
doi:10.3389/fmars.2019.00211
fatcat:t2xhvx4cfbeyvlcb6paq7ecbtq
Fusing Blockchain and AI with Metaverse: A Survey
2022
IEEE Open Journal of the Computer Society
Thus, it is promising to build an exciting digital world and to transform a better physical world through the exploration of the metaverse. ...
digital currencies, AI applications in the virtual world, and blockchain-empowered technologies. ...
paradigm with federated learning. ...
doi:10.1109/ojcs.2022.3188249
fatcat:53lmfbcetzemhnsuiao7qzgnia
Confidential Machine Learning Computation in Untrusted Environments: A Systems Security Perspective
[article]
2021
arXiv
pre-print
As machine learning (ML) technologies and applications are rapidly changing many domains of computing, security issues associated with ML are also emerging. ...
This paper conducts a systematic and comprehensive survey by classifying attack vectors and mitigation in TEE-protected confidential ML computation in the untrusted environment, analyzes the multi-party ...
Compared to on-device ML deployment, the necessity of a trusted gradient aggregator emerges in federated learning. ...
arXiv:2111.03308v2
fatcat:kmklsqvzureilldvr4ui4azrwi
KONFIDO: An OpenNCP-Based Secure eHealth Data Exchange System
[chapter]
2018
Communications in Computer and Information Science
and that is interconnected with other SIEMs to exchange security metrics via a publish-subscribe communication channel (Figure 3 ). ...
The second one is needed to allow the data processing of sensitive data (respecting the privacy requirement) in terms of data threshold comparison, structure coherence and so on without access to the relative ...
-Secure and Trusted Paradigm for Interoperable eHealth Services, Acronym: KONFIDO). ...
doi:10.1007/978-3-319-95189-8_2
fatcat:mjaljcmeszc6xdsh5hsnllhyvu
A Survey on Metaverse: Fundamentals, Security, and Privacy
[article]
2022
arXiv
pre-print
Metaverse, as an evolving paradigm of the next-generation Internet, aims to build a fully immersive, hyper spatiotemporal, and self-sustaining virtual shared space for humans to play, work, and socialize ...
In this paper, we present a comprehensive survey of the fundamentals, security, and privacy of metaverse. ...
U20A20175, U1808207), and the Fundamental Research Funds for the Central Universities. ...
arXiv:2203.02662v3
fatcat:iudwizbvp5cv3fga6lpvydlrna
Blockchain Technology and Artificial Intelligence Together: A Critical Review on Applications
2022
Applied Sciences
Using a decentralized, secure, and trustworthy system, blockchain technology can automate bitcoin payments and provide users access to a shared ledger of records, transactions, and data. ...
It is undeniable that the adoption of blockchain- and artificial intelligence (AI)-based paradigms is proceeding at lightning speed. ...
Data Availability Statement: Not applicable.
Conflicts of Interest: The authors declare no conflict of interest. ...
doi:10.3390/app122412948
fatcat:ppfbpsd53ngjnn6mzgo7hus2ji
Reliability Inversion: A Cautionary Tale
2020
Computer
COMPUTER: Are there any promising new security or privacy paradigms for addressing cybersecurity threats? ...
His research interests include the Internet of Things, pervasive computing, the blockchain, crowdsourcing, data analytics, and privacy and security. ...
Neural networks are now a common subject in computer science, and they have been taught to two or three generations of undergraduates. ...
doi:10.1109/mc.2019.2958907
fatcat:xcaxq7gocbfy5iyv2ne7d6nwlu
D3.1: Strategy analysis report and Cloud Computing
2021
Zenodo
To tackle Europe digitalisation priority, the European Commission defined "A European strategy for data" and "A new Industrial Strategy for Europe", including a strong focus on data spaces and federated ...
to the adoption and provision of cloud computing with a specific focus on federated cloud, edge computing, and green computing. ...
data transfer to safe results. • Federated [machine] learning is a good example. • Applications need to be ported to the edge (as well as to the cloud) to enable sharing of data between edge and cloud ...
doi:10.5281/zenodo.5530740
fatcat:j56fkvlparegliqexa5p27ckge
A Comprehensive Insight into Blockchain Technology: Past Development, Present Impact and Future Considerations
2022
International Journal of Advanced Computer Science and Applications
Blockchain technology is based on the idea of a distributed, consensus ledger, which it employs to create a secure, immutable data storage and management system. ...
It is a publicly accessible and collectively managed ledger enabling unprecedented levels of trust and transparency between business and individual collaborations. ...
Bisma Rasool Pampori and Ms. Gousia Nissar in proofreading, editing, and formatting the paper. ...
doi:10.14569/ijacsa.2022.01311101
fatcat:nzap2pb5dvclzgdxshrpzgc3yq
Mapping the Global Legal Landscape of Blockchain Technologies
2017
Social Science Research Network
This requires the development of clear policies on crossborder data collection, analysis and sharing that are robust enough to create and sustain public trust. ...
from anywhere and everywhere with global reach.Finally, the learning curve with blockchain is steep. ...
By working across disciplines and in partnership with the best peers and experts, we are the benchmark for influential research and trusted analysis. ...
doi:10.2139/ssrn.2930077
fatcat:4cykn7zhujgubmzv2r3fj5mgva
Blockchain for the Metaverse: A Review
[article]
2022
arXiv
pre-print
Next, we extensively discuss blockchain-based methods for the metaverse from technical perspectives, such as data acquisition, data storage, data sharing, data interoperability, and data privacy preservation ...
Despite great attention and benefits, a natural question in the metaverse is how to secure its users' digital content and data. ...
The combination of blockchain, XAI, and federated learning approaches will improve the quality of digital twins in the metaverse [9] . C. ...
arXiv:2203.09738v2
fatcat:emhvqsghgffa5eqtnkrsgzkqsa
A Full Dive into Realizing the Edge-enabled Metaverse: Visions, Enabling Technologies,and Challenges
[article]
2022
arXiv
pre-print
Moreover, given the high computation costs required, e.g., to render 3D virtual worlds and run data-hungry artificial intelligence-driven avatars, we discuss the computation challenges and cloud-edge-end ...
to manage physical edge resources in a decentralized, transparent, and immutable manner. ...
Nevertheless, blockchain-based data sharing becomes less efficient and risky as the volume of user data increases and privacy becomes more important. ...
arXiv:2203.05471v2
fatcat:jhl66faxw5clnopsb5rbsopzoq
« Previous
Showing results 1 — 15 out of 152 results