[PDF][PDF] Internet of cultural things: Current research, challenges and opportunities

X Liang, F Liu, L Wang, B Zheng… - Computers, Materials and …, 2023 - cdn.techscience.cn
Driven by the visions of the Internet of Things (IoT), Artificial Intelligence (AI), and 5G
communications, the Internet of Cultural Things (IoCT) realize the comprehensive …

[PDF][PDF] Coverless Video Steganography Based on Frame Sequence Perceptual Distance Mapping.

R Li, J Qin, Y Tan, NN Xiong - Computers, Materials & Continua, 2022 - cdn.techscience.cn
Most existing coverless video steganography algorithms use a particular video frame for
information hiding. These methods do not reflect the unique sequential features of video …

Post-Quantum Searchable Encryption Supporting User-Authorization for Outsourced Data Management

S Xu, Y Cao, X Chen, Y Guo, Y Yang, F Guo… - Proceedings of the 33rd …, 2024 - dl.acm.org
With the widespread development of database systems, data security has become crucial
when it comes to sharing among users and servers. A straightforward approach involves …

[PDF][PDF] A Novel Distributed Token-Based Access Control Algorithm Using A Secret Sharing Scheme for Secure Data Access Control

JR Amalraj, R Lourdusamy - International Journal of Computer …, 2022 - academia.edu
Electronic health (e-Health) services present a proficient exchange of the patient's records
among various entities; they contain physicians, receptionists, nurses, insurance …

Conditional Proxy Re-Encryption-Based Key Sharing Mechanism for Clustered Federated Learning

Y Zhang, Z Zhang, S Ji, S Wang, S Huang - Electronics, 2024 - mdpi.com
The need of data owners for privacy protection has given rise to collaborative learning, and
data-related issues heterogeneity faced by federated learning has further given rise to …

Multi-domain authorization and decision-making method of access control in the edge environment

Y Sun, W Jiang, Y Yang, H Zhu, Y Jiang - Computer Networks, 2023 - Elsevier
The problem of mutual trust between users and edge nodes in an edge computing
environment is a sufficient guarantee for the double security of edge computing service …

[PDF][PDF] Criss-Cross Attentional Siamese Networks for Object Tracking.

Z Wang, J Qin, X Xiang, Y Tan… - Computers, Materials & …, 2022 - cdn.techscience.cn
Visual object tracking is a hot topic in recent years. In the meanwhile, Siamese networks
have attracted extensive attention in this field because of its balanced precision and speed …

FairCMS: Cloud Media Sharing With Fair Copyright Protection

X Xiao, Y Zhang, LY Zhang, Z Hua… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The onerous media sharing task prompts resource-constrained media owners to seek help
from a cloud platform, ie, storing media contents in the cloud and letting the cloud do the …

Exploring Data Traceability Methods in Information Management within Universities: An Action Research and Case Study Approach

H Chen, Z Hu - IEEE Access, 2024 - ieeexplore.ieee.org
As university information management grows increasingly complex, the demand for
seamless data sharing and interaction across various departments and faculties has surged …

A secret and traceable approach for cloud data sharing

C Xu, Y Yin, Y Chen - … Conference on Cyber Security and Cloud …, 2023 - ieeexplore.ieee.org
With the development of cloud computing, data owners generally use cloud services to
reduce storage and computing overhead. However, data stored in cloud servers is out of the …