Journal articles on the topic 'Secure classification'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Secure classification.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Pearson, Jane L., Deborah A. Cohn, Philip A. Cowan, and Carolyn Pape Cowan. "Earned- and continuous-security in adult attachment: Relation to depressive symptomatology and parenting style." Development and Psychopathology 6, no. 2 (1994): 359–73. http://dx.doi.org/10.1017/s0954579400004636.
Full textHareesha, K. S., and M. Sumana. "Secure Two Party Privacy Preserving Classification Using Encryption." International Journal of Information and Electronics Engineering 6, no. 2 (2016): 67–71. http://dx.doi.org/10.18178/ijiee.2016.6.2.597.
Full textBaars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture." International Journal of Information Security and Privacy 6, no. 1 (January 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Full textT., Tamanna, and Rajeev Kumar. "Secure Cloud Model using Classification and Cryptography." International Journal of Computer Applications 159, no. 6 (February 15, 2017): 8–13. http://dx.doi.org/10.5120/ijca2017912953.
Full textUsharani, A. V., and Girija Attigeri. "Secure EMR Classification and Deduplication Using MapReduce." IEEE Access 10 (2022): 34404–14. http://dx.doi.org/10.1109/access.2022.3161439.
Full textWiseman, Simon R. "Classification services in the SWORD secure DBMS." Computers & Security 14, no. 4 (January 1995): 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.
Full textSalehi, Mahmood, and Azzedine Boukerche. "Secure opportunistic routing protocols: methods, models, and classification." Wireless Networks 25, no. 2 (September 11, 2017): 559–71. http://dx.doi.org/10.1007/s11276-017-1575-1.
Full text., S. Narayanan. "CLASSIFICATION OF SECURE ENCRYPTED RELATIONALDATA IN CLOUD COMPUTING." International Journal of Research in Engineering and Technology 05, no. 03 (March 25, 2016): 159–66. http://dx.doi.org/10.15623/ijret.2016.0503034.
Full textS L Swapna and V Saravanan. "Jaccard Index Cat Gradient Boosting Classification for Secured Big Data Communication." Applied Science and Engineering Journal for Advanced Research 1, no. 5 (September 30, 2022): 1–14. http://dx.doi.org/10.54741/asejar.1.5.1.
Full textB, Murugeshwari, Jayakumar C, and Sarukesi K. "Secure Multi Party Computation Technique for Classification Rule Sharing." International Journal of Computer Applications 55, no. 7 (October 20, 2012): 1–10. http://dx.doi.org/10.5120/8764-2683.
Full textKatarahweire, Marriette, Engineer Bainomugisha, and Khalid A. Mughal. "Data Classification for Secure Mobile Health Data Collection Systems." Development Engineering 5 (2020): 100054. http://dx.doi.org/10.1016/j.deveng.2020.100054.
Full textAhmed, Kazi Wasif, Omit Chanda, Noman Mohammed, and Yang Wang. "Obfuscated image classification for secure image-centric friend recommendation." Sustainable Cities and Society 41 (August 2018): 940–48. http://dx.doi.org/10.1016/j.scs.2017.10.001.
Full textTawalbeh, Lo’ai, Nour S. Darwazeh, Raad S. Al-Qassas, and Fahd AlDosari. "A Secure Cloud Computing Model based on Data Classification." Procedia Computer Science 52 (2015): 1153–58. http://dx.doi.org/10.1016/j.procs.2015.05.150.
Full textBalachander, J., and E. Ramanujam. "Rule based Medical Content Classification for Secure Remote Health Monitoring." International Journal of Computer Applications 165, no. 4 (May 17, 2017): 21–26. http://dx.doi.org/10.5120/ijca2017913852.
Full textXue, Liang, Dongxiao Liu, Cheng Huang, Xiaodong Lin, and Xuemin Sherman Shen. "Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity." Journal of Communications and Information Networks 5, no. 1 (March 2020): 16–25. http://dx.doi.org/10.23919/jcin.2020.9055107.
Full textLiu, Jiasen, Chao Wang, Zheng Tu, Xu An Wang, Chuan Lin, and Zhihu Li. "Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace." Security and Communication Networks 2021 (November 3, 2021): 1–12. http://dx.doi.org/10.1155/2021/8759922.
Full textResende, Amanda, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, and Diego F. Aranha. "Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation." IEEE Transactions on Information Forensics and Security 17 (2022): 428–42. http://dx.doi.org/10.1109/tifs.2022.3144007.
Full textTangod, Kiran, and Gururaj Kulkarni. "Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification." Journal of Intelligent Systems 29, no. 1 (June 29, 2018): 703–18. http://dx.doi.org/10.1515/jisys-2017-0353.
Full textSamanthula, Bharath K., Yousef Elmehdwi, and Wei Jiang. "k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data." IEEE Transactions on Knowledge and Data Engineering 27, no. 5 (May 1, 2015): 1261–73. http://dx.doi.org/10.1109/tkde.2014.2364027.
Full textUdhaya, P., and G. Manikandan. "An enhanced approach for secure pattern classification in adversarial environment." Contemporary Engineering Sciences 8 (2015): 533–38. http://dx.doi.org/10.12988/ces.2015.5269.
Full textZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu, and Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Full textYoo, Yongjae, Jihwan Suh, Jeongyeup Paek, and Saewoong Bahk. "Secure Region Detection Using Wi-Fi CSI and One-Class Classification." IEEE Access 9 (2021): 65906–13. http://dx.doi.org/10.1109/access.2021.3076176.
Full textS. Almasoud, Ahmed, Abdelzahir Abdelmaboud, Faisal S. Alsubaei, Manar Ahmed Hamza, Ishfaq Yaseen, Mohammed Abaker, Abdelwahed Motwakel, and Mohammed Rizwanullah. "Deep Learning with Image Classification Based Secure CPS for Healthcare Sector." Computers, Materials & Continua 72, no. 2 (2022): 2633–48. http://dx.doi.org/10.32604/cmc.2022.024619.
Full textIDRIS, ISMAILA, UMAR MAJIGI MUHAMMAD, MUHAMMAD ABDULHAMID SHAFI'I, OLALERE MORUFU, BASHIR ABDULLAHI MUHAMMAD, and O. NWAOCHA VIVIAN. "SECURE UNIVERSITY NETWORK ARCHITECTURE, VULNERABILITIES, RISK PRIORITY LEVEL CLASSIFICATION AND COUNTERMEASURES." i-manager’s Journal on Wireless Communication Networks 7, no. 2 (2018): 42. http://dx.doi.org/10.26634/jwcn.7.2.15604.
Full textYang, Haomiao, Shaopeng Liang, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. "Secure and Efficient k NN Classification for Industrial Internet of Things." IEEE Internet of Things Journal 7, no. 11 (November 2020): 10945–54. http://dx.doi.org/10.1109/jiot.2020.2992349.
Full textLiu, Yi, Yu Luo, Youwen Zhu, Yang Liu, and Xingxin Li. "Secure multi-label data classification in cloud by additionally homomorphic encryption." Information Sciences 468 (November 2018): 89–102. http://dx.doi.org/10.1016/j.ins.2018.07.054.
Full textDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang, and Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification." Applied Sciences 12, no. 24 (December 14, 2022): 12873. http://dx.doi.org/10.3390/app122412873.
Full textKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao, and G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication." E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Full textZuber, Martin, and Renaud Sirdey. "Efficient homomorphic evaluation of k-NN classifiers." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 111–29. http://dx.doi.org/10.2478/popets-2021-0020.
Full textSchoppmann, Phillipp, Lennart Vogelsang, Adrià Gascón, and Borja Balle. "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 209–29. http://dx.doi.org/10.2478/popets-2020-0024.
Full textTarik, Boudheb, and Elberrichi Zakaria. "Privacy Preserving Classification of Biomedical Data With Secure Removing of Duplicate Records." International Journal of Organizational and Collective Intelligence 8, no. 3 (July 2018): 41–58. http://dx.doi.org/10.4018/ijoci.2018070104.
Full textKjamilji, Artrim, Arben Idrizi, Shkurte Luma-Osmani, and Ferihane Zenuni-Kjamilji. "Secure Naïve Bayes Classification without Loss of Accuracy with Application to Breast Cancer Prediction." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): 397–403. http://dx.doi.org/10.14421/icse.v3.536.
Full textSumana M. and Hareesha K.S. "Accurate Classification Models for Distributed Mining of Privately Preserved Data." International Journal of Information Security and Privacy 10, no. 4 (October 2016): 58–73. http://dx.doi.org/10.4018/ijisp.2016100104.
Full textAlrayes, Fatma S., Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen, and Abdelwahed Motwakel. "Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems." Drones 6, no. 9 (August 26, 2022): 222. http://dx.doi.org/10.3390/drones6090222.
Full textAparna, R., and B. B. Amberker. "Analysis of Key Management Schemes for Secure Group Communication and Their Classification." Journal of Computing and Information Technology 17, no. 2 (2009): 203. http://dx.doi.org/10.2498/cit.1001215.
Full textTangod, Kiran, and Gururaj Kulkarni. "Secure agent-based diagnosis and classification using optimal kernel support vector machine." International Journal of Biomedical Engineering and Technology 37, no. 1 (2021): 25. http://dx.doi.org/10.1504/ijbet.2021.117513.
Full textKulkarni, Gururaj, and Kiran Tangod. "Secure Agent Based Diagnosis and Classification Using Optimal Kernel Support Vector Machine." International Journal of Biomedical Engineering and Technology 1, no. 1 (2018): 1. http://dx.doi.org/10.1504/ijbet.2018.10013947.
Full textPak, Wooguil. "Design of Integrated packet classification algorithm for Supporting High Performance Secure Routers." Journal of Security Engineering 15, no. 2 (April 30, 2018): 103–18. http://dx.doi.org/10.14257/jse.2018.04.02.
Full textWu, Wei, Jian Liu, Hong Rong, Huimei Wang, and Ming Xian. "Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database." IEEE Access 6 (2018): 41771–84. http://dx.doi.org/10.1109/access.2018.2859758.
Full textKaur, Kulwinder, and Vikas Zandu. "A Secure Data Classification Model in Cloud Computing Using Machine Learning Approach." International Journal of Grid and Distributed Computing 9, no. 8 (August 31, 2016): 13–22. http://dx.doi.org/10.14257/ijgdc.2016.9.8.02.
Full textJ., Swathy, and Surya S.R. "Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data." International Journal of Computer Applications 133, no. 8 (January 15, 2016): 1–4. http://dx.doi.org/10.5120/ijca2016907988.
Full textLiu, Lin, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng, and Xiaofeng Wang. "Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data." IEEE Internet of Things Journal 6, no. 6 (December 2019): 9841–52. http://dx.doi.org/10.1109/jiot.2019.2932444.
Full textSun, Maohua, and Ruidi Yang. "An efficient secure k nearest neighbor classification protocol with high‐dimensional features." International Journal of Intelligent Systems 35, no. 11 (August 30, 2020): 1791–813. http://dx.doi.org/10.1002/int.22272.
Full textJararweh, Yaser, Mahmoud Al-Ayyoub, Lo’ai Tawalbeh, Ala’ Darabseh, and Houbing Song. "Software-defined systems support for secure cloud computing based on data classification." Annals of Telecommunications 72, no. 5-6 (November 8, 2016): 335–45. http://dx.doi.org/10.1007/s12243-016-0549-0.
Full textA. Alissa, Khalid, Mohammed Maray, Areej A. Malibari, Sana Alazwari, Hamed Alqahtani, Mohamed K. Nour, Marwa Obbaya, Mohamed A. Shamseldin, and Mesfer Al Duhayyim. "Optimal Deep Learning Model Enabled Secure UAV Classification for營ndustry 4.0." Computers, Materials & Continua 74, no. 3 (2023): 5349–67. http://dx.doi.org/10.32604/cmc.2023.033532.
Full textLokhande, Meghana P., Dipti Durgesh Patil, Lalit V. Patil, and Mohammad Shabaz. "Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery." Security and Communication Networks 2021 (August 27, 2021): 1–16. http://dx.doi.org/10.1155/2021/5287514.
Full textArkhipova, Anastasiya, and Danila Karevskiy. "Honeypot as a tool for creating an effective secure system." Digital Technology Security, no. 2 (June 25, 2021): 122–35. http://dx.doi.org/10.17212/2782-2230-2021-2-122-135.
Full textRiggio, Giacomo, Angelo Gazzano, Borbála Zsilák, Beatrice Carlone, and Chiara Mariti. "Quantitative Behavioral Analysis and Qualitative Classification of Attachment Styles in Domestic Dogs: Are Dogs with a Secure and an Insecure-Avoidant Attachment Different?" Animals 11, no. 1 (December 23, 2020): 14. http://dx.doi.org/10.3390/ani11010014.
Full textKumar, Abhinav, Sanjay Kumar Singh, K. Lakshmanan, Sonal Saxena, and Sameer Shrivastava. "A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images." ACM Transactions on Internet Technology 21, no. 2 (June 2021): 1–22. http://dx.doi.org/10.1145/3424221.
Full textGongada, Sandhya Rani, Muktevi Chakravarthy, and Bhukya Mangu. "Power system contingency classification using machine learning technique." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3091–98. http://dx.doi.org/10.11591/eei.v11i6.4031.
Full text