Deep-learning-enhanced multitarget detection for end–edge–cloud surveillance in smart IoT

X Zhou, X Xu, W Liang, Z Zeng… - IEEE Internet of Things …, 2021 - ieeexplore.ieee.org
Along with the rapid development of cloud computing, IoT, and AI technologies, cloud video
surveillance (CVS) has become a hotly discussed topic, especially when facing the …

CHAT-Bot: A cultural heritage aware teller-bot for supporting touristic experiences

M Casillo, F Clarizia, G D'Aniello, M De Santo… - Pattern Recognition …, 2020 - Elsevier
Cultural heritage is an important resource that allows us to know and promote a territory. In
this respect, it is important to experiment with the enhancement of cultural heritage by …

A context-aware chatbot for tourist destinations

F Clarizia, F Colace, M De Santo… - … on Signal-Image …, 2019 - ieeexplore.ieee.org
The cultural heritage is one of the most important resources of the territory. It represents one
of the scenarios where new technologies can provide more interesting contributions. In …

One-pass lossless data hiding and compression of remote sensing data

B Carpentieri, A Castiglione, A De Santis… - Future generation …, 2019 - Elsevier
The information obtained by means of spectral remote sensing (ie, the hyperspectral
images) are involved in several real-life scenarios and applications. Historical research …

On the protection of consumer genomic data in the Internet of Living Things

R Pizzolante, A Castiglione, B Carpentieri… - Computers & …, 2018 - Elsevier
Several companies have recently emerged to provide online Direct-To-Consumer (DTC)
DNA analysis and sequencing. Those activities will be, in the near future, the foundations of …

Efficient compression and encryption for digital data transmission

B Carpentieri - Security and Communication Networks, 2018 - Wiley Online Library
We live in a digital era in which communication is largely based on the exchange of digital
information on data networks. Communication is often pictured as a sender that transmits a …

Protection of microscopy images through digital watermarking techniques

R Pizzolante, A Castiglione… - 2014 international …, 2014 - ieeexplore.ieee.org
Nowadays microscopy confocal images are becoming more and more a fundamental tool for
many application fields, including biology, forensic analysis, medicine, industrial research …

An effective grouping method for privacy-preserving bike sharing data publishing

ASMT Hasan, Q Jiang, C Li - Future Internet, 2017 - mdpi.com
Bike sharing programs are eco-friendly transportation systems that are widespread in smart
city environments. In this paper, we study the problem of privacy-preserving bike sharing …

Compression‐based steganography

B Carpentieri, A Castiglione, A De Santis… - Concurrency and …, 2020 - Wiley Online Library
Conventional privacy‐enforcement mechanisms, such as encryption‐based ones, are
frequently used to prevent third‐party eavesdroppers to intercept confidential information …

Energy-efficient relay tracking with multiple mobile camera sensors

T Wang, J Zeng, MZA Bhuiyan, Y Chen, Y Cai, H Tian… - Computer Networks, 2018 - Elsevier
Abstract Camera Sensor Networks (CSNs) has been deployed for many applications of
video surveillance. In urban road or large buildings, camera sensors are deployed in public …