[HTML][HTML] Blockchain technology for cybersecurity: A text mining literature analysis
Blockchain, the technology infrastructure behind the famous cryptocurrency bitcoin, can take
away the notion of trust from centralized organizations to a decentralized platform that is …
away the notion of trust from centralized organizations to a decentralized platform that is …
Comprehensive survey: Biometric user authentication application, evaluation, and discussion
R Alrawili, AAS AlQahtani, MK Khan - Computers and Electrical …, 2024 - Elsevier
In this paper, we present a comprehensive review of the literature on biometric user
authentication, encompassing an analysis of key aspects such as the selection of biometric …
authentication, encompassing an analysis of key aspects such as the selection of biometric …
Adversarial examples—Security threats to COVID-19 deep learning systems in medical IoT devices
Medical IoT devices are rapidly becoming part of management ecosystems for pandemics
such as COVID-19. Existing research shows that deep learning (DL) algorithms have been …
such as COVID-19. Existing research shows that deep learning (DL) algorithms have been …
Measuring decentrality in blockchain based systems
Blockchain promises to provide a distributed and decentralized means of trust among
untrusted users. However, in recent years, a shift from decentrality to centrality has been …
untrusted users. However, in recent years, a shift from decentrality to centrality has been …
Image transformation-based defense against adversarial perturbation on deep learning models
Deep learning algorithms provide state-of-the-art results on a multitude of applications.
However, it is also well established that they are highly vulnerable to adversarial …
However, it is also well established that they are highly vulnerable to adversarial …
On the robustness of face recognition algorithms against attacks and bias
Face recognition algorithms have demonstrated very high recognition performance,
suggesting suitability for real world applications. Despite the enhanced accuracies …
suggesting suitability for real world applications. Despite the enhanced accuracies …
A survey on biometric cryptosystems and their applications
S Sharma, A Saini, S Chaudhury - Computers & Security, 2023 - Elsevier
Biometric systems (BSs) have shown prominent results in providing secure authentication
protocols and a unique identification ecosystem for various applications. Over the years …
protocols and a unique identification ecosystem for various applications. Over the years …
A survey on privacy-preserving blockchain systems (PPBS) and a novel PPBS-based framework for smart agriculture
QN Tran, BP Turnbull, HT Wu… - IEEE Open Journal …, 2021 - ieeexplore.ieee.org
Blockchain and smart contracts have seen significant application over the last decade,
revolutionising many industries, including cryptocurrency, finance and banking, and supply …
revolutionising many industries, including cryptocurrency, finance and banking, and supply …
Continuous user identification in distance learning: a recent technology perspective
The worldwide shift to distance learning at Higher Education Institutions (HEIs) during the
COVID-19 global pandemic has raised several concerns about the credibility of online …
COVID-19 global pandemic has raised several concerns about the credibility of online …
Adversarial attacks against face recognition: A comprehensive study
Face recognition (FR) systems have demonstrated reliable verification performance,
suggesting suitability for real-world applications ranging from photo tagging in social media …
suggesting suitability for real-world applications ranging from photo tagging in social media …