过去一年中添加的文章,按日期排序

SRAS: Self-governed Remote Attestation Scheme for Multi-party Collaboration

L Tian, Y Shen, Z Li - arXiv preprint arXiv:2407.03745, 2024 - arxiv.org
9 天前 - … SGX, a hardware-based trusted computing technology developed by Intel, serves
the critical purpose of safeguarding sensitive data and code from unauthorized access and …

Exploring Social Media Use Among Young Adults for Health Information Acquisition

A Khursheed, S Rasul - Journalism, Politics and Society, 2024 - jpolas.com
13 天前 - … (Stanley, 2015) that is why this study aims to explore Cross-Platform use motivations,
Cross-Platform daily usage time, and Cross-Platform use intensity. The intensity scale for …

(In) visible Privacy Indicator: Security Analysis of Privacy Indicator on Android Devices

Y Choe, H Yu, T Kim, S Lee, H Lee, H Kim - … Conference on Computer …, 2024 - dl.acm.org
14 天前 - … notification bar when an application accesses the camera. … The first attack uses
screen overlay techniques with a … of the privacy indicator using trusted execution facilities. We …

Per-Pixel Forest Attribute Mapping and Error Estimation: The Google Earth Engine and R dataDriven Tool

S Francini, A Marcelli, G Chirici, RM Di Biase… - Sensors, 2024 - mdpi.com
24 天前 - … This paper introduces the dataDriven open access tool, a novel statistical design-based …
of the Google Earth Engine cloud computing platform, and the R programming …

[HTML][HTML] 一种云环境中的虚拟机回滚安全模型

黄庆, 许阳光, 姜文超, 代炜琦 - Computer Science and Application, 2024 - hanspub.org
29 天前 - : 虚拟机(VM) 回滚可能会被滥用来对系统发动攻击, 导致无论是否使用可信计算技术(TPM),
云环境安全问题始终存在, 对云计算安全提出严峻挑战. 本文报告了在使用TPM 环境中和不…

Digital Flamenco with Video Pirates

G Doërr - Proceedings of the 2024 ACM Workshop on …, 2024 - dl.acm.org
29 天前 - … While early generations of such systems relied on playlist/manifest manipulation,
the rapid development of CDN edge compute capabilities led to more scalable designs where …

Revolutionizing E-Commerce With Consumer-Driven Energy-Efficient WSNs: A Multi-Characteristics Approach

I Ullah, D Adhikari, F Ali, A Ali, H Khan… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
33 天前 - … WSN application needs must be considered while designing the communication
technique, including deployment environment, network size, hardware, and data traffic designs

An AI-Powered Computer Vision Module for Social Interactive Agents

FX Gaya Morey, C Manresa-Yee… - … on Human Computer …, 2024 - dl.acm.org
35 天前 - … are challenging to transfer across different platforms. In this study, we introduce a
general-purpose AI-powered computer vision module designed to address this challenge. Our …

TeTPCM: building endogenous trusted computing on trusted execution environment

J Li, C Huang, J Luo, J Kong, Y Ji, Y Liu… - … on Computer …, 2024 - spiedigitallibrary.org
37 天前 - … TPCM, which builds an endogenous trusted computing architecture by the … design
issues are discussed in TeTPCM: First, how to build a hardware-protected Trusted Computing

20 Trust in public sector AI The case of Finland's Aurora national program

S Dan, J Kalliokoski, K Shahzad - … Application of AI Technology, 2024 - books.google.com
39 天前 - designed and implemented in practice in the complex world of public sector
organizations, which oftentimes lack citizens' trust… single case study research design. As the …