Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …
are adopting the cloud environment due to the least upfront capital investment, maximum …
[HTML][HTML] Toward explainable electrical load forecasting of buildings: A comparative study of tree-based ensemble methods with Shapley values
Electrical load forecasting of buildings is crucial in designing an energy operation strategy
for smart city realization. Although artificial intelligence techniques have demonstrated …
for smart city realization. Although artificial intelligence techniques have demonstrated …
Monthly electric load forecasting using transfer learning for smart cities
Monthly electric load forecasting is essential to efficiently operate urban power grids.
Although diverse forecasting models based on artificial intelligence techniques have been …
Although diverse forecasting models based on artificial intelligence techniques have been …
Efficient closed high-utility pattern fusion model in large-scale databases
JCW Lin, Y Djenouri, G Srivastava - Information Fusion, 2021 - Elsevier
Abstract High-Utility Itemset Mining (HUIM) is considered a major issue in recent decades
since it reveals profit strategies for use in industry for decision-making. Most existing works …
since it reveals profit strategies for use in industry for decision-making. Most existing works …
A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images
M Nazari, M Mehrabian - Multimedia Tools and Applications, 2021 - Springer
Nowadays, secure medical data transmission is an essential issue in telemedicine through
unsecured channels. Watermarking methods are widely used to provide optimal security for …
unsecured channels. Watermarking methods are widely used to provide optimal security for …
Data hiding: current trends, innovation and potential challenges
AK Singh - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
With the widespread growth of digital information and improved internet technologies, the
demand for improved information security techniques has significantly increased due to …
demand for improved information security techniques has significantly increased due to …
Text data security and privacy in the internet of things: threats, challenges, and future directions
In our daily life, Internet‐of‐Things (IoT) is everywhere and used in many more beneficial
functionalities. It is used in our homes, hospitals, fire prevention, and reporting and …
functionalities. It is used in our homes, hospitals, fire prevention, and reporting and …
Y-DWMS: A digital watermark management system based on smart contracts
With the development of information technology, films, music, and other publications are
inclined to be distributed in digitalized form. However, the low cost of data replication and …
inclined to be distributed in digitalized form. However, the low cost of data replication and …
Advanced security and privacy technique for digital text in smart grid communications
In the current era of technology, digital contents copyright protection is a significant issue in
the Internet of Things and smart grid. Digital contents are distributed, reproduced, and …
the Internet of Things and smart grid. Digital contents are distributed, reproduced, and …
Silent guardian: Protecting text from malicious exploitation by large language models
The rapid development of large language models (LLMs) has yielded impressive success in
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …