[PDF][PDF] Internet of cultural things: Current research, challenges and opportunities
X Liang, F Liu, L Wang, B Zheng… - Computers, Materials and …, 2023 - cdn.techscience.cn
Driven by the visions of the Internet of Things (IoT), Artificial Intelligence (AI), and 5G
communications, the Internet of Cultural Things (IoCT) realize the comprehensive …
communications, the Internet of Cultural Things (IoCT) realize the comprehensive …
[PDF][PDF] Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping.
R Li, J Qin, Y Tan, NN Xiong - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Most existing coverless video steganography algorithms use a particular video frame for
information hiding. These methods do not reflect the unique sequential features of video …
information hiding. These methods do not reflect the unique sequential features of video …
Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management
With the widespread development of database systems, data security has become crucial
when it comes to sharing among users and servers. A straightforward approach involves …
when it comes to sharing among users and servers. A straightforward approach involves …
[PDF][PDF] A Novel Distributed Token-Based Access Control Algorithm Using A Secret Sharing Scheme for Secure Data Access Control
JR Amalraj, R Lourdusamy - International Journal of Computer …, 2022 - academia.edu
Electronic health (e-Health) services present a proficient exchange of the patient's records
among various entities; they contain physicians, receptionists, nurses, insurance …
among various entities; they contain physicians, receptionists, nurses, insurance …
Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning
Y Zhang, Z Zhang, S Ji, S Wang, S Huang - Electronics, 2024 - mdpi.com
The need of data owners for privacy protection has given rise to collaborative learning, and
data-related issues heterogeneity faced by federated learning has further given rise to …
data-related issues heterogeneity faced by federated learning has further given rise to …
Multi-domain authorization and decision-making method of access control in the edge environment
Y Sun, W Jiang, Y Yang, H Zhu, Y Jiang - Computer Networks, 2023 - Elsevier
The problem of mutual trust between users and edge nodes in an edge computing
environment is a sufficient guarantee for the double security of edge computing service …
environment is a sufficient guarantee for the double security of edge computing service …
[PDF][PDF] Criss-Cross Attentional Siamese Networks for Object Tracking.
Z Wang, J Qin, X Xiang, Y Tan… - Computers, Materials & …, 2022 - cdn.techscience.cn
Visual object tracking is a hot topic in recent years. In the meanwhile, Siamese networks
have attracted extensive attention in this field because of its balanced precision and speed …
have attracted extensive attention in this field because of its balanced precision and speed …
FairCMS: Cloud Media Sharing With Fair Copyright Protection
The onerous media sharing task prompts resource-constrained media owners to seek help
from a cloud platform, ie, storing media contents in the cloud and letting the cloud do the …
from a cloud platform, ie, storing media contents in the cloud and letting the cloud do the …
Exploring Data Traceability Methods in Information Management within Universities: An Action Research and Case Study Approach
H Chen, Z Hu - IEEE Access, 2024 - ieeexplore.ieee.org
As university information management grows increasingly complex, the demand for
seamless data sharing and interaction across various departments and faculties has surged …
seamless data sharing and interaction across various departments and faculties has surged …
A secret and traceable approach for cloud data sharing
C Xu, Y Yin, Y Chen - … Conference on Cyber Security and Cloud …, 2023 - ieeexplore.ieee.org
With the development of cloud computing, data owners generally use cloud services to
reduce storage and computing overhead. However, data stored in cloud servers is out of the …
reduce storage and computing overhead. However, data stored in cloud servers is out of the …