[HTML][HTML] Blockchain technology for cybersecurity: A text mining literature analysis

R Prakash, VS Anoop, S Asharaf - International Journal of Information …, 2022 - Elsevier
Blockchain, the technology infrastructure behind the famous cryptocurrency bitcoin, can take
away the notion of trust from centralized organizations to a decentralized platform that is …

Comprehensive survey: Biometric user authentication application, evaluation, and discussion

R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …

Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices

A Rahman, MS Hossain, NA Alrajeh… - IEEE Internet of Things …, 2020 - ieeexplore.ieee.org
Medical IoT devices are rapidly becoming part of management ecosystems for pandemics
such as COVID-19. Existing research shows that deep learning (DL) algorithms have been …

Measuring decentrality in blockchain based systems

SP Gochhayat, S Shetty, R Mukkamala, P Foytik… - IEEE …, 2020 - ieeexplore.ieee.org
Blockchain promises to provide a distributed and decentralized means of trust among
untrusted users. However, in recent years, a shift from decentrality to centrality has been …

Image transformation-based defense against adversarial perturbation on deep learning models

A Agarwal, R Singh, M Vatsa… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Deep learning algorithms provide state-of-the-art results on a multitude of applications.
However, it is also well established that they are highly vulnerable to adversarial …

On the robustness of face recognition algorithms against attacks and bias

R Singh, A Agarwal, M Singh, S Nagpal… - Proceedings of the AAAI …, 2020 - aaai.org
Face recognition algorithms have demonstrated very high recognition performance,
suggesting suitability for real world applications. Despite the enhanced accuracies …

A survey on biometric cryptosystems and their applications

S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …

A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture

QN Tran, BP Turnbull, HT Wu… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Blockchain and smart contracts have seen significant application over the last decade,
revolutionising many industries, including cryptocurrency, finance and banking, and supply …

Continuous user identification in distance learning: a recent technology perspective

D Portugal, JN Faria, M Belk, P Martins… - Smart Learning …, 2023 - Springer
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …

Adversarial attacks against face recognition: A comprehensive study

F Vakhshiteh, A Nickabadi, R Ramachandra - IEEE Access, 2021 - ieeexplore.ieee.org
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …