- 2024
- Divyanshu Awasthi
, Anurag Tiwari, Priyank Khare, Vinay Kumar Srivastava:
A comprehensive review on optimization-based image watermarking techniques for copyright protection. Expert Syst. Appl. 242: 122830 (2024) - Oussama Merabet
, A. Kheldoun, M. Bouchahdane, A. Eltom, Ahmed Kheldoun:
An adaptive protection coordination for microgrids utilizing an improved optimization technique for user-defined DOCRs characteristics with different groups of settings considering N-1 contingency. Expert Syst. Appl. 248: 123449 (2024) - Med Sayah Moad, Narima Zermi, Khaldi Amine, Kafi Med Redouane:
Medical image protection using a data-hiding technique based on integer wavelets. Multim. Tools Appl. 83(15): 45843-45857 (2024) - Shideh Yavary Mehr
, Byrav Ramamurthy:
Protection Techniques using Resource Delayed Release for SDN-based OTN over WDM Networks. Opt. Switch. Netw. 51: 100762 (2024) - Jaehyuk Lee, Wonbin Jeong, Kyungroul Lee:
Keyboard Data Protection Technique Using GAN in Password-Based User Authentication: Based on C/D Bit Vulnerability. Sensors 24(4): 1229 (2024) - Syed Raza Bashir, Shaina Raza, Vojislav B. Misic:
Progress in Privacy Protection: A Review of Privacy Preserving Techniques in Recommender Systems, Edge Computing, and Cloud Computing. CoRR abs/2401.11305 (2024) - 2023
- Juan Carlos Bernal-Romero
, Juan Manuel Ramírez-Cortés
, Jose de Jesus Rangel-Magdaleno
, Pilar Gómez-Gil
, Hayde Peregrina-Barreto, Israel Cruz-Vega
:
A Review on Protection and Cancelable Techniques in Biometric Systems. IEEE Access 11: 8531-8568 (2023) - Md. Rezwan Hasan
, Richard M. Guest
, Farzin Deravi
:
Presentation-level Privacy Protection Techniques for Automated Face Recognition - A Survey. ACM Comput. Surv. 55(13s): 286:1-286:27 (2023) - Mingfu Xue
, Shichang Sun, Can He, Dujuan Gu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
ActiveGuard: An active intellectual property protection technique for deep neural networks by leveraging adversarial examples as users' fingerprints. IET Comput. Digit. Tech. 17(3-4): 111-126 (2023) - Si-Yi Li, Sheng Cheng Lee, Sheng-Hsi Hung, Zheng-Lun Huang, Ke-Horng Chen
, Kuo-Lin Zheng, Ying-Hsi Lin, Shian-Ru Lin, Tsung-Yen Tsai:
A 4-40 V Wide Input Range Boost Converter With the Protection Re-Cycling Technique for 200 W High Power LiDAR System in a Long-Distance Object Detection. IEEE J. Solid State Circuits 58(7): 1850-1859 (2023) - Hager Fahmy, Eman M. El-Gendy
, M. A. Mohamed, Mahmoud M. Saafan
:
ECH3OA: An Enhanced Chimp-Harris Hawks Optimization Algorithm for copyright protection in Color Images using watermarking techniques. Knowl. Based Syst. 269: 110494 (2023) - Mohammed Lansari
, Reda Bellafqira
, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan
, Gouenou Coatrieux:
When Federated Learning Meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. Mach. Learn. Knowl. Extr. 5(4): 1382-1406 (2023) - Ferda Ernawan
, Dhani Ariatmanto:
A recent survey on image watermarking using scaling factor techniques for copyright protection. Multim. Tools Appl. 82(18): 27123-27163 (2023) - Purushottam Sharma
, Shaurya Kapoor, Richa Sharma:
Ransomware detection, prevention and protection in IoT devices using ML techniques based on dynamic analysis approach. Int. J. Syst. Assur. Eng. Manag. 14(1): 287-296 (2023) - Wael Al Hanaineh
, José Matas
, Josep M. Guerrero
:
A Comparative Study of Smart THD-Based Fault Protection Techniques for Distribution Networks. Sensors 23(10): 4874 (2023) - Andrea Pinto
, Luis-Carlos Herrera
, Yezid Donoso
, Jairo A. Gutiérrez
:
Survey on Intrusion Detection Systems Based on Machine Learning Techniques for the Protection of Critical Infrastructure. Sensors 23(5): 2415 (2023) - Rijoy Mukherjee, Rajat Subhra Chakraborty
:
Attacks on Recent DNN IP Protection Techniques and Their Mitigation. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(11): 3642-3650 (2023) - Mingfu Xue
, Zhiyu Wu, Yushu Zhang
, Jian Wang, Weiqiang Liu
:
AdvParams: An Active DNN Intellectual Property Protection Technique via Adversarial Perturbation Based Parameter Encryption. IEEE Trans. Emerg. Top. Comput. 11(3): 664-678 (2023) - Vedrana Krivokuca Hahn
, Sébastien Marcel
:
Biometric Template Protection for Neural-Network-Based Face Recognition Systems: A Survey of Methods and Evaluation Techniques. IEEE Trans. Inf. Forensics Secur. 18: 639-666 (2023) - Veerakumar Bose, Hany F. Habib, Christopher Alan Belcastro, Harish Suryanarayana:
A New Protection Scheme for Static Transfer Switch Using Quasi Resonant Turn-Off Technique. IAS 2023: 1-25 - Jiaxuan Wu, Shuoqiang Zeng, Wei-Yang Chiu, Peichen Liu, Weizhi Meng
, Brooke Lampe
:
Delay-masquerading Technique Upheld StrongBox: A Reinforced Side-Channel Protection. ICPADS 2023: 2135-2142 - Xingnan Zhang, Jingjia Huang, Yue Feng:
A Comprehensive Approach to Mitigate Return-Oriented Programming Attacks: Combining Operating System Protection Mechanisms and Hardware-Assisted Techniques. ICSECS 2023: 453-458 - Serhii Mitsenko, Serhii Naumenko, Inna Rozlomii, Andrii Yarmilko:
Information Protection and Recovery Hamming Codes Based' Hash Technique. ICST 2023: 64-77 - Le Danh Tai, Ta Minh Thanh:
Digital Image Watermarking Algorithm Using Blockmarking Technique for Copyright Protection. KSE 2023: 1-4 - Matheus M. Silveira, Ariel L. C. Portela, Rafael A. Menezes, Michael S. Souza, Danielle S. Silva, Maria C. Mesquita, Rafael L. Gomes
:
Data Protection based on Searchable Encryption and Anonymization Techniques. NOMS 2023: 1-5 - Kalid Nafil, Aziza Saufi, Ouafae Hdili, Sara Faqihi, Halima Maghraoui, Abdellatif Kobbane, Mohammed El Koutbi:
Lettuce Leaf Disease Protection and Detection Using Image Processing Technique. WINCOM 2023: 1-6 - Mohammed Lansari, Reda Bellafqira, Katarzyna Kapusta, Vincent Thouvenot, Olivier Bettan, Gouenou Coatrieux:
When Federated Learning meets Watermarking: A Comprehensive Overview of Techniques for Intellectual Property Protection. CoRR abs/2308.03573 (2023) - Diego André Cerqueira, Rafael Maiani de Mello, Guilherme Horta Travassos:
Experimental Evaluation of a Checklist-Based Inspection Technique to Verify the Compliance of Software Systems with the Brazilian General Data Protection Law. CoRR abs/2308.14874 (2023) - 2022
- Ishu Gupta
, Ashutosh Kumar Singh
, Chung-Nan Lee, Rajkumar Buyya
:
Secure Data Storage and Sharing Techniques for Data Protection in Cloud Environments: A Systematic Review, Analysis, and Future Directions. IEEE Access 10: 71247-71277 (2022) - Abhishek Gupta
, Ramesh Kumar Pachar, Om Prakash Mahela
, Baseem Khan
:
Fusion of Signal Processing Techniques to Design Current and Voltage Features Based Protection Scheme for Utility Grid With Renewable Energy Penetration. IEEE Access 10: 118222-118235 (2022)