Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (22,098)
  • Open Access

    ARTICLE

    Detection of Parkinson’s Disease with Multiple Feature Extraction Models and Darknet CNN Classification

    G. Prema Arokia Mary1,*, N. Suganthi2

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 333-345, 2022, DOI:10.32604/csse.2022.021164

    Abstract Parkinson’s disease (PD) is a neurodegenerative disease in the central nervous system. Recently, more researches have been conducted in the determination of PD prediction which is really a challenging task. Due to the disorders in the central nervous system, the syndromes like off sleep, speech disorders, olfactory and autonomic dysfunction, sensory disorder symptoms will occur. The earliest diagnosing of PD is very challenging among the doctors community. There are techniques that are available in order to predict PD using symptoms and disorder measurement. It helps to save a million lives of future by early prediction. In this article, the early… More >

  • Open Access

    ARTICLE

    Secured Cloud Communication Using Lightweight Hash Authentication with PUF

    R. Padmavathy*, M. Newlin Rajkumar

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 233-243, 2022, DOI:10.32604/csse.2022.021129

    Abstract Internet-of-Things (IoT) is an awaited technology in real-world applications to process daily tasks using intelligent techniques. The main process of data in IoT involves communication, integration, and coordination with other real-world applications. The security of transferred, stored, and processed data in IoT is not ensured in many constraints. Internet-enabled smart devices are widely used among populations for all types of applications, thus increasing the popularity of IoT among widely used server technologies. Smart grid is used in this article with IoT to manage large data. A smart grid is a collection of numerous users in the network with the fastest… More >

  • Open Access

    ARTICLE

    Home Monitoring of Pets Based on AIoT

    Wen-Tsai Sung1, Sung-Jung Hsiao2,*

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 59-75, 2022, DOI:10.32604/csse.2022.020745

    Abstract With technological and social development in recent decades, people have begun pursuing more comfortable lives that frequently feature household pets that are treated like members of the family. On average, one out of every three households has a pet. This has also led to the creation and growth of many businesses in the pet industry. A few companies have developed a system that allows busy office workers to remotely care for pets at home based on the Internet of Things and an intelligent adjustment function. As owners of two dogs, the authors of this study observed their pets’ living habits… More >

  • Open Access

    ARTICLE

    Feature Selection Using Grey Wolf Optimization with Random Differential Grouping

    R. S. Latha1,*, B. Saravana Balaji2, Nebojsa Bacanin3, Ivana Strumberger3, Miodrag Zivkovic3, Milos Kabiljo3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 317-332, 2022, DOI:10.32604/csse.2022.020487

    Abstract Big data are regarded as a tremendous technology for processing a huge variety of data in a short time and with a large storage capacity. The user’s access over the internet creates massive data processing over the internet. Big data require an intelligent feature selection model by addressing huge varieties of data. Traditional feature selection techniques are only applicable to simple data mining. Intelligent techniques are needed in big data processing and machine learning for an efficient classification. Major feature selection algorithms read the input features as they are. Then, the features are preprocessed and classified. Here, an algorithm does… More >

  • Open Access

    ARTICLE

    Document Clustering Using Graph Based Fuzzy Association Rule Generation

    P. Perumal*

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 203-218, 2022, DOI:10.32604/csse.2022.020459

    Abstract With the wider growth of web-based documents, the necessity of automatic document clustering and text summarization is increased. Here, document summarization that is extracting the essential task with appropriate information, removal of unnecessary data and providing the data in a cohesive and coherent manner is determined to be a most confronting task. In this research, a novel intelligent model for document clustering is designed with graph model and Fuzzy based association rule generation (gFAR). Initially, the graph model is used to map the relationship among the data (multi-source) followed by the establishment of document clustering with the generation of association… More >

  • Open Access

    ARTICLE

    Early Diagnosis of Alzheimer’s Disease Based on Convolutional Neural Networks

    Atif Mehmood1,*, Ahed Abugabah1, Ahmed Ali AlZubi2, Louis Sanzogni3

    Computer Systems Science and Engineering, Vol.43, No.1, pp. 305-315, 2022, DOI:10.32604/csse.2022.018520

    Abstract Alzheimer’s disease (AD) is a neurodegenerative disorder, causing the most common dementia in the elderly peoples. The AD patients are rapidly increasing in each year and AD is sixth leading cause of death in USA. Magnetic resonance imaging (MRI) is the leading modality used for the diagnosis of AD. Deep learning based approaches have produced impressive results in this domain. The early diagnosis of AD depends on the efficient use of classification approach. To address this issue, this study proposes a system using two convolutional neural networks (CNN) based approaches for an early diagnosis of AD automatically. In the proposed… More >

  • Open Access

    ARTICLE

    A Performance Study of Membership Inference Attacks on Different Machine Learning Algorithms

    Jumana Alsubhi1, Abdulrahman Gharawi1, Mohammad Alahmadi2,*

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 193-200, 2021, DOI:10.32604/jihpp.2021.027871

    Abstract Nowadays, machine learning (ML) algorithms cannot succeed without the availability of an enormous amount of training data. The data could contain sensitive information, which needs to be protected. Membership inference attacks attempt to find out whether a target data point is used to train a certain ML model, which results in security and privacy implications. The leakage of membership information can vary from one machine-learning algorithm to another. In this paper, we conduct an empirical study to explore the performance of membership inference attacks against three different machine learning algorithms, namely, K-nearest neighbors, random forest, support vector machine, and logistic… More >

  • Open Access

    ARTICLE

    An Explanatory Strategy for Reducing the Risk of Privacy Leaks

    Mingting Liu1, Xiaozhang Liu1,*, Anli Yan1, Xiulai Li1,2, Gengquan Xie1, Xin Tang3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 181-192, 2021, DOI:10.32604/jihpp.2021.027385

    Abstract As machine learning moves into high-risk and sensitive applications such as medical care, autonomous driving, and financial planning, how to interpret the predictions of the black-box model becomes the key to whether people can trust machine learning decisions. Interpretability relies on providing users with additional information or explanations to improve model transparency and help users understand model decisions. However, these information inevitably leads to the dataset or model into the risk of privacy leaks. We propose a strategy to reduce model privacy leakage for instance interpretability techniques. The following is the specific operation process. Firstly, the user inputs data into… More >

  • Open Access

    ARTICLE

    A Survey on Binary Code Vulnerability Mining Technology

    Pengzhi Xu1,2, Zetian Mai1,2, Yuhao Lin1, Zhen Guo1,2,*, Victor S. Sheng3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 165-179, 2021, DOI:10.32604/jihpp.2021.027280

    Abstract With the increase of software complexity, the security threats faced by the software are also increasing day by day. So people pay more and more attention to the mining of software vulnerabilities. Although source code has rich semantics and strong comprehensibility, source code vulnerability mining has been widely used and has achieved significant development. However, due to the protection of commercial interests and intellectual property rights, it is difficult to obtain source code. Therefore, the research on the vulnerability mining technology of binary code has strong practical value. Based on the investigation of related technologies, this article firstly introduces the… More >

  • Open Access

    ARTICLE

    Verifiable Privacy-Preserving Neural Network on Encrypted Data

    Yichuan Liu1, Chungen Xu1,*, Lei Xu1, Lin Mei1, Xing Zhang2, Cong Zuo3

    Journal of Information Hiding and Privacy Protection, Vol.3, No.4, pp. 151-164, 2021, DOI:10.32604/jihpp.2021.026944

    Abstract The widespread acceptance of machine learning, particularly of neural networks leads to great success in many areas, such as recommender systems, medical predictions, and recognition. It is becoming possible for any individual with a personal electronic device and Internet access to complete complex machine learning tasks using cloud servers. However, it must be taken into consideration that the data from clients may be exposed to cloud servers. Recent work to preserve data confidentiality has allowed for the outsourcing of services using homomorphic encryption schemes. But these architectures are based on honest but curious cloud servers, which are unable to tell… More >

Displaying 8671-8680 on page 868 of 22098. Per Page