Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleDecember 2024
Understanding Information Disclosure from Secure Computation Output: A Comprehensive Study of Average Salary Computation
ACM Transactions on Privacy and Security (TOPS), Volume 28, Issue 1Article No.: 12, Pages 1–36https://doi.org/10.1145/3705004Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security models,...
- research-articleNovember 2024
- ArticleOctober 2024
Diversity Population Metrics in Diploid and Haploid Genetic Algorithm Variants
AbstractGenetic Algorithms (GAs) are powerful optimization techniques inspired by the principles of natural selection and genetics. One critical aspect of their success lies in the diversity of solutions within their populations. Diversity ensures ...
- research-articleNovember 2024
New Approach for Online Voting Ensuring Privacy and Verifiability
Programming and Computing Software (KLU-PACS), Volume 50, Issue Suppl 1Pages S60–S68https://doi.org/10.1134/S0361768824700427AbstractDistrust in voting is not a rare phenomenon even in developed countries. Electronic voting (e-voting), however, appeared as an alternative, but is still not practiced on a large scale. This is due to the fact that despite the huge number of ...
- research-articleAugust 2024
-
- research-articleAugust 2024
A Research on Genetic Algorithm-Based Task Scheduling in Cloud-Fog Computing Systems
Automatic Control and Computer Sciences (ACCS), Volume 58, Issue 4Pages 392–407https://doi.org/10.3103/S0146411624700512AbstractIn recent years, the proliferating of IoT (Internet of things)-originated applications have generated huge amounts of data, which has put enormous pressure on infrastructures such as the network cloud. In this regard, scholars have proposed an ...
- research-articleJuly 2024
Use of Threshold and No-Threshold Methods of Discrete Wavelet Filtering of Radar Signals
Cybernetics and Systems Analysis (KLU-CASA), Volume 60, Issue 4Pages 656–666https://doi.org/10.1007/s10559-024-00704-4AbstractThe efficiency of threshold and no-threshold wavelet noise filtering methods in processing radar signals is analyzed. Three methods of wavelet analysis are considered: a method with a general limit threshold for wavelet coefficients of detail; a ...
- short-paperJune 2024
Engineered Features for Personal Textual Language Style Clusters
PETRA '24: Proceedings of the 17th International Conference on PErvasive Technologies Related to Assistive EnvironmentsPages 273–276https://doi.org/10.1145/3652037.3663954Hand-crafted features to detect idiolect (individual language style) in short text passages with k-means clustering differentiate individuals based on stylistic indicators. With a relatively small number of input samples and low computational resources, ...
- short-paperJune 2024
Co-Stega: Collaborative Linguistic Steganography for the Low Capacity Challenge in Social Media
IH&MMSec '24: Proceedings of the 2024 ACM Workshop on Information Hiding and Multimedia SecurityPages 7–12https://doi.org/10.1145/3658664.3659657Social media platforms, with their extensive and real-time text data, are important application environments for linguistic generative steganography. However, the fragmented and context-constrained nature of social media text leads to a notably low ...
- research-articleJune 2024
Understanding Information Disclosure from Secure Computation Output: A Study of Average Salary Computation
CODASPY '24: Proceedings of the Fourteenth ACM Conference on Data and Application Security and PrivacyPages 187–198https://doi.org/10.1145/3626232.3653280Secure multi-party computation has seen substantial performance improvements in recent years and is being increasingly used in commercial products. While a significant amount of work was dedicated to improving its efficiency under standard security ...
- research-articleAugust 2024
Information Theories of Event Probability Estimation
Scientific and Technical Information Processing (SPSTIP), Volume 51, Issue 2Pages 101–105https://doi.org/10.3103/S0147688224700011AbstractThis article analyzes the theoretical and methodological provisions of seminal works concerning the efficiency of research, development and development management, and production for hi-tech products in the context of uncertainty in order to make ...
- research-articleMay 2024
Learning-based Property Estimation with Polynomials
Proceedings of the ACM on Management of Data (PACMMOD), Volume 2, Issue 3Article No.: 148, Pages 1–27https://doi.org/10.1145/3654994The problem of estimating data properties using sampling frequency histograms has attracted extensive interest in the area of databases. The properties include the number of distinct values (NDV), entropy, and so on. In the field of databases, property ...
- short-paperMay 2024
Predicting Node Influence in Complex Networks by the K-Shell Entropy and Degree Centrality
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 629–632https://doi.org/10.1145/3589335.3651547Currently, with the expansion of the use of social networks, the topic of information dissemination has achieved significant importance. The spread of rumors and efforts to stop them have led researchers to pay more attention than ever to predicting the ...
- research-articleMay 2024
Assessing Web Fingerprinting Risk
WWW '24: Companion Proceedings of the ACM Web Conference 2024Pages 245–254https://doi.org/10.1145/3589335.3648322Modern Web APIs allow developers to provide extensively customized experiences for website visitors, but the richness of the device information they provide also make them vulnerable to being abused to construct browser fingerprints, device-specific ...
- research-articleJuly 2024
A variable block range fractal method for image compression
International Journal of Intelligent Engineering Informatics (IJIEI), Volume 12, Issue 3Pages 261–275https://doi.org/10.1504/ijiei.2024.140161This paper presents and implements a variable block range fractal (VBRF) method for image compression on RGB images of different categories. The proposed technique shows improvement in compression ratio (CR), peak signal noise ratio (PSNR), similarity ...
- research-articleJune 2024
Wavelet-based temporal models of human activity for anomaly detection in smart robot-assisted environments1
Journal of Ambient Intelligence and Smart Environments (JAISE), Volume 16, Issue 2Pages 181–200https://doi.org/10.3233/AIS-230144Detecting anomalies in patterns of sensor data is important in many practical applications, including domestic activity monitoring for Active Assisted Living (AAL). How to represent and analyse these patterns, however, remains a challenging task, ...
- research-articleMarch 2024
An Extended EDAS Approach Based on Cumulative Prospect Theory for Multiple Attributes Group Decision Making with Interval-Valued Intuitionistic Fuzzy Information
The interval-valued intuitionistic fuzzy sets (IVIFSs), based on the intuitionistic fuzzy sets (IFSs), combine the classical decision method and its research and application is attracting attention. After a comparative analysis, it becomes clear that ...
- research-articleMarch 2024
Clustering ensemble by clustering selected weighted clusters
International Journal of Computational Science and Engineering (IJCSE), Volume 27, Issue 2Pages 159–166https://doi.org/10.1504/ijcse.2024.137284Due to the fact that no single clustering approach is capable of producing the optimal result for any given data, the notion of clustering ensembles has emerged, which attempts to extract a novel and robust consensus clustering from a given ensemble of ...
- research-articleFebruary 2024
Cross-efficiency aggregation based on interval conditional entropy: An application to forest carbon sink efficiency
Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology (JIFS), Volume 46, Issue 2Pages 4397–4415https://doi.org/10.3233/JIFS-223071Cross-efficiency evaluation is an extension of data envelopment analysis (DEA), which can effectively distinguish between decision-making units (DMUs) through self- and peer-evaluation. The cross-efficiency of each DMU in a set of DMUs is measured in ...
- research-articleFebruary 2024
Optimizing the Algorithm of Wavelet Packet Signal Filtering
Cybernetics and Systems Analysis (KLU-CASA), Volume 60, Issue 1Pages 135–145https://doi.org/10.1007/s10559-024-00654-xAbstractA wavelet packet filtering algorithm has been developed, which includes cyclic movement along the branches of the wavelet packet tree with a constraint on each branch of the approximation and detail coefficients until the minimum root-mean-square ...