Privacy preservation in Artificial Intelligence and Extended Reality (AI-XR) metaverses: A survey
The metaverse is a nascent concept that envisions a virtual universe, a collaborative space
where individuals can interact, create, and participate in a wide range of activities. Privacy in …
where individuals can interact, create, and participate in a wide range of activities. Privacy in …
Strix: An end-to-end streaming architecture with two-level ciphertext batching for fully homomorphic encryption with programmable bootstrapping
Homomorphic encryption (HE) is a type of cryptography that allows computations to be
performed on encrypted data. The technique relies on learning with errors problem, where …
performed on encrypted data. The technique relies on learning with errors problem, where …
Vision language models in autonomous driving: A survey and outlook
The applications of Vision-Language Models (VLMs) in the field of Autonomous Driving (AD)
have attracted widespread attention due to their outstanding performance and the ability to …
have attracted widespread attention due to their outstanding performance and the ability to …
Homomorphic Encryption for AI-Based Applications: Challenges and Opportunities
R Hamza - 2023 15th International Conference on Knowledge …, 2023 - ieeexplore.ieee.org
Homomorphic encryption is a technique that allows computations with encrypted data
without revealing the data or requiring decryption. This technique has many potential …
without revealing the data or requiring decryption. This technique has many potential …
Privacy-Preserving and Trustworthy Deep Learning for Medical Imaging
K Sedghighadikolaei, AA Yavuz - arXiv preprint arXiv:2407.00538, 2024 - arxiv.org
The shift towards efficient and automated data analysis through Machine Learning (ML) has
notably impacted healthcare systems, particularly Radiomics. Radiomics leverages ML to …
notably impacted healthcare systems, particularly Radiomics. Radiomics leverages ML to …
A Hybrid Protection Scheme for the Gait Analysis in Early Dementia Recognition
Human activity recognition (HAR) through gait analysis is a very promising research area for
early detection of neurodegenerative diseases because gait abnormalities are typical …
early detection of neurodegenerative diseases because gait abnormalities are typical …
Secret learning for lung cancer diagnosis—A study with homomorphic encryption, texture analysis and deep learning
S Adhikary, S Dutta, AD Dwivedi - Biomedical Physics & …, 2023 - iopscience.iop.org
Advanced lung cancer diagnoses from radiographic images include automated detection of
lung cancer from CT-Scan images of the lungs. Deep learning is a popular method for …
lung cancer from CT-Scan images of the lungs. Deep learning is a popular method for …
An improved IoT based security model for fitness tracker using quantum fruit fly optimization improved faster RCNN
PT Shanthala, D Annapurna - International Journal of Information …, 2023 - Springer
Significant progress has been made as a result of the various technology intersections like
blockchain, cloud computing, robotics, artificial intelligence, 5G, and big data. A variety of …
blockchain, cloud computing, robotics, artificial intelligence, 5G, and big data. A variety of …
Blockchain-based decentralised privacy-preserving machine learning authentication and verification with immersive devices in the urban metaverse ecosystem
K Kuru, K Kuru - 2024 - preprints.org
Through the development of the metaverse concept from the Sumerian myth (5500-1800
BC) and mind-altering novel,“Snow Crash” in 1992, to today's information age, human-and …
BC) and mind-altering novel,“Snow Crash” in 1992, to today's information age, human-and …
Self-learning activation functions to increase accuracy of privacy-preserving Convolutional Neural Networks with homomorphic encryption
B Pulido-Gaytan, A Tchernykh - PloS one, 2024 - journals.plos.org
The widespread adoption of cloud computing necessitates privacy-preserving techniques
that allow information to be processed without disclosure. This paper proposes a method to …
that allow information to be processed without disclosure. This paper proposes a method to …