AI-driven data security and privacy

被引:3
作者
Yan, Zheng [1 ,2 ]
Susilo, Willy [3 ]
Bertino, Elisa [4 ]
Zhang, Jun [5 ]
Yang, Laurence T. [6 ]
机构
[1] Xidian Univ, Xian, Peoples R China
[2] Aalto Univ, Espoo, Finland
[3] Univ Wollongong, Wollongong, NSW, Australia
[4] Purdue Univ, W Lafayette, IN 47907 USA
[5] Swinburne Univ Technol, Hawthorn, Vic, Australia
[6] St Francis Xavier Univ, Antigonish, NS, Canada
基金
芬兰科学院; 中国国家自然科学基金;
关键词
DATA-COLLECTION; DATA ANALYTICS; NETWORKS; INTERNET;
D O I
10.1016/j.jnca.2020.102842
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
引用
收藏
页数:2
相关论文
共 17 条
  • [1] A system call refinement-based enhanced Minimum Redundancy Maximum Relevance method for ransomware early detection
    Ahmed, Yahye Abukar
    Kocer, Baris
    Huda, Shamsul
    Al-rimy, Bander Ali Saleh
    Hassan, Mohammad Mehedi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 167
  • [2] CHOW YW, 2020, J NETW COMPUT APPL
  • [3] A survey on data fusion in internet of things: Towards secure and privacy-preserving fusion
    Ding, Wenxiu
    Jing, Xuyang
    Yan, Zheng
    Yang, Laurence T.
    [J]. INFORMATION FUSION, 2019, 51 : 129 - 144
  • [4] Privacy preserving based logistic regression on big data
    Fan, Yongkai
    Bai, Jianrong
    Lei, Xia
    Zhang, Yuqing
    Zhang, Bin
    Li, Kuan-Ching
    Tan, Gang
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 171
  • [5] A Survey on Security, Privacy, and Trust in Mobile Crowdsourcing
    Feng, Wei
    Yan, Zheng
    Zhang, Hengrun
    Zeng, Kai
    Xiao, Yu
    Hou, Y. Thomas
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04): : 2971 - 2992
  • [6] Deep learning methods in network intrusion detection: A survey and an objective comparison
    Gamage, Sunanda
    Samarabandu, Jagath
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 169 (169)
  • [7] Towards efficient motion-blurred public security video super-resolution based on back-projection networks
    Guo, Kehua
    Guo, Haifu
    Ren, Sheng
    Zhang, Jian
    Li, Xi
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 166
  • [8] LTE/LTE-A Network Security Data Collection and Analysis for Security Measurement: A Survey
    He, Limei
    Yan, Zheng
    Atiquzzaman, Mohammed
    [J]. IEEE ACCESS, 2018, 6 : 4220 - 4242
  • [9] Security Data Collection and Data Analytics in the Internet: A Survey
    Jing, Xuyang
    Yan, Zheng
    Pedrycz, Witold
    [J]. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2019, 21 (01): : 586 - 618
  • [10] A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation
    Li, Wenjuan
    Tan, Jiao
    Meng, Weizhi
    Wang, Yu
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2020, 165