115 results on '"Ali Miri"'
Search Results
2. PETRIoT - A Privacy Enhancing Technology Recommendation Framework for IoT Computing.
3. Preserving Privacy in High-Dimensional Data Publishing.
4. Building Detection-Resistant Reconnaissance Attacks Based on Adversarial Explainability.
5. Explainable Ensemble-Based Detection of Cyber Attacks on Internet of Medical Things.
6. Forensic Identification of Android Trojans Using Stacked Ensemble of Deep Neural Networks.
7. XMeDNN: An Explainable Deep Neural Network System for Intrusion Detection in Internet of Medical Things.
8. Evaluating Generative Adversarial Networks: A Topological Approach.
9. Publishing Private High-dimensional Datasets: A Topological Approach.
10. Parasite Chain Attack Detection in the IOTA Network.
11. Resilience of GANs against Adversarial Attacks.
12. Mutually Private Verifiable Machine Learning As-a-service: A Distributed Approach.
13. User and Event Behavior Analytics on Differentially Private Data for Anomaly Detection.
14. A Decentralized, Privacy-preserving and Crowdsourcing-based Approach to Medical Research.
15. Enabling Medical Research Through Privacy-Preserving Data Markets.
16. Cross-Scenario Performance Modelling for Big Data Ecosystems.
17. An Emerging Strategy for Privacy Preserving Databases: Differential Privacy.
18. Secure Digital Service as a Utility and the Unit of Measure.
19. Real-Time Energy-Conserving VM-Provisioning Framework for Cloud-Data Centers.
20. Using Honeypots in a Decentralized Framework to Defend Against Adversarial Machine-Learning Attacks.
21. Automated Identification of Over-Privileged SmartThings Apps.
22. Cryptographically Enforced Access Control in Blockchain-Based Platforms.
23. SSD: Cache or Tier an Evaluation of SSD Cost and Efficiency using MapReduce.
24. Automatic Clustering of Attacks in Intrusion Detection Systems.
25. A Sybil Resistant IoT Trust Model Using Blockchains.
26. An IoT trust and reputation model based on recommender systems.
27. Secure image data deduplication through compressive sensing.
28. A Combined Solution for Conjunctive Keyword Search, Phrase Search and Auditing for Encrypted Cloud Storage.
29. Scanning for Viruses on Encrypted Cloud Storage.
30. Anonymous Authentication with a Bi-directional Identity Federation in the Cloud.
31. Energy-Efficient Resource Allocation for Cloud Data Centres Using a Multi-way Data Analysis Technique.
32. Multivariate Time Series ELM for Cloud Data Centre Workload Prediction.
33. Privacy Preserving Predictive Analytics with Smart Meters.
34. An Analysis of the Security of Compressed Sensing Using an Artificial Neural Network.
35. End-to-End Performance Prediction for Selecting Cloud Services Solutions.
36. A Low Storage Phase Search Scheme Based on Bloom Filters for Encrypted Cloud Services.
37. Using ELM Techniques to Predict Data Centre VM Requests.
38. An Extreme Learning Machine (ELM) Predictor for Electric Arc Furnaces' v-i Characteristics.
39. Open Source Cloud Management Platforms: A Review.
40. Similarity Measure Based on Low-Rank Approximation for Highly Scalable Recommender Systems.
41. An Efficient Conjunctive Keyword and Phase Search Scheme for Encrypted Cloud Storage Systems.
42. End-to-End QoS Prediction of Vertical Service Composition in the Cloud.
43. A Secure Video Deduplication Scheme in Cloud Storage Environments Using H.264 Compression.
44. Index Selection on MapReduce Relational-Databases.
45. Computation and Search over Encrypted XML Documents.
46. Proof of Storage for Video Deduplication in the Cloud.
47. End-to-End QoS Prediction Model of Vertically Composed Cloud Services via Tensor Factorization.
48. Output and Input Data Perturbations for Differentially Private Databases.
49. A Systematic Cloud Workload Clustering Technique in Large Scale Data Centers.
50. Proof of Retrieval and Ownership Protocols for Images through SPIHT Compression.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.