Secure data storage and sharing techniques for data protection in cloud environments: A systematic review, analysis, and future directions

I Gupta, AK Singh, CN Lee, R Buyya - IEEE Access, 2022 - ieeexplore.ieee.org
A large number of researchers, academia, government sectors, and business enterprises
are adopting the cloud environment due to the least upfront capital investment, maximum …

[HTML][HTML] Toward explainable electrical load forecasting of buildings: A comparative study of tree-based ensemble methods with Shapley values

J Moon, S Rho, SW Baik - Sustainable Energy Technologies and …, 2022 - Elsevier
Electrical load forecasting of buildings is crucial in designing an energy operation strategy
for smart city realization. Although artificial intelligence techniques have demonstrated …

Monthly electric load forecasting using transfer learning for smart cities

SM Jung, S Park, SW Jung, E Hwang - Sustainability, 2020 - mdpi.com
Monthly electric load forecasting is essential to efficiently operate urban power grids.
Although diverse forecasting models based on artificial intelligence techniques have been …

Efficient closed high-utility pattern fusion model in large-scale databases

JCW Lin, Y Djenouri, G Srivastava - Information Fusion, 2021 - Elsevier
Abstract High-Utility Itemset Mining (HUIM) is considered a major issue in recent decades
since it reveals profit strategies for use in industry for decision-making. Most existing works …

A novel chaotic IWT-LSB blind watermarking approach with flexible capacity for secure transmission of authenticated medical images

M Nazari, M Mehrabian - Multimedia Tools and Applications, 2021 - Springer
Nowadays, secure medical data transmission is an essential issue in telemedicine through
unsecured channels. Watermarking methods are widely used to provide optimal security for …

Data hiding: current trends, innovation and potential challenges

AK Singh - ACM Transactions on Multimedia Computing …, 2020 - dl.acm.org
With the widespread growth of digital information and improved internet technologies, the
demand for improved information security techniques has significantly increased due to …

Text data security and privacy in the internet of things: threats, challenges, and future directions

U Khadam, MM Iqbal, M Alruily… - Wireless …, 2020 - Wiley Online Library
In our daily life, Internet‐of‐Things (IoT) is everywhere and used in many more beneficial
functionalities. It is used in our homes, hospitals, fire prevention, and reporting and …

Y-DWMS: A digital watermark management system based on smart contracts

B Zhao, L Fang, H Zhang, C Ge, W Meng, L Liu, C Su - Sensors, 2019 - mdpi.com
With the development of information technology, films, music, and other publications are
inclined to be distributed in digitalized form. However, the low cost of data replication and …

Advanced security and privacy technique for digital text in smart grid communications

U Khadam, MM Iqbal, S Saeed, SH Dar… - Computers & Electrical …, 2021 - Elsevier
In the current era of technology, digital contents copyright protection is a significant issue in
the Internet of Things and smart grid. Digital contents are distributed, reproduced, and …

Silent guardian: Protecting text from malicious exploitation by large language models

J Zhao, K Chen, X Yuan, Y Qi… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
The rapid development of large language models (LLMs) has yielded impressive success in
various downstream tasks. However, the vast potential and remarkable capabilities of LLMs …