Статті в журналах з теми "Secure classification"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Secure classification".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Pearson, Jane L., Deborah A. Cohn, Philip A. Cowan, and Carolyn Pape Cowan. "Earned- and continuous-security in adult attachment: Relation to depressive symptomatology and parenting style." Development and Psychopathology 6, no. 2 (1994): 359–73. http://dx.doi.org/10.1017/s0954579400004636.
Повний текст джерелаHareesha, K. S., and M. Sumana. "Secure Two Party Privacy Preserving Classification Using Encryption." International Journal of Information and Electronics Engineering 6, no. 2 (2016): 67–71. http://dx.doi.org/10.18178/ijiee.2016.6.2.597.
Повний текст джерелаBaars, Thijs, and Marco Spruit. "Designing a Secure Cloud Architecture." International Journal of Information Security and Privacy 6, no. 1 (January 2012): 14–32. http://dx.doi.org/10.4018/jisp.2012010102.
Повний текст джерелаT., Tamanna, and Rajeev Kumar. "Secure Cloud Model using Classification and Cryptography." International Journal of Computer Applications 159, no. 6 (February 15, 2017): 8–13. http://dx.doi.org/10.5120/ijca2017912953.
Повний текст джерелаUsharani, A. V., and Girija Attigeri. "Secure EMR Classification and Deduplication Using MapReduce." IEEE Access 10 (2022): 34404–14. http://dx.doi.org/10.1109/access.2022.3161439.
Повний текст джерелаWiseman, Simon R. "Classification services in the SWORD secure DBMS." Computers & Security 14, no. 4 (January 1995): 307–21. http://dx.doi.org/10.1016/0167-4048(95)00004-r.
Повний текст джерелаSalehi, Mahmood, and Azzedine Boukerche. "Secure opportunistic routing protocols: methods, models, and classification." Wireless Networks 25, no. 2 (September 11, 2017): 559–71. http://dx.doi.org/10.1007/s11276-017-1575-1.
Повний текст джерела., S. Narayanan. "CLASSIFICATION OF SECURE ENCRYPTED RELATIONALDATA IN CLOUD COMPUTING." International Journal of Research in Engineering and Technology 05, no. 03 (March 25, 2016): 159–66. http://dx.doi.org/10.15623/ijret.2016.0503034.
Повний текст джерелаS L Swapna and V Saravanan. "Jaccard Index Cat Gradient Boosting Classification for Secured Big Data Communication." Applied Science and Engineering Journal for Advanced Research 1, no. 5 (September 30, 2022): 1–14. http://dx.doi.org/10.54741/asejar.1.5.1.
Повний текст джерелаB, Murugeshwari, Jayakumar C, and Sarukesi K. "Secure Multi Party Computation Technique for Classification Rule Sharing." International Journal of Computer Applications 55, no. 7 (October 20, 2012): 1–10. http://dx.doi.org/10.5120/8764-2683.
Повний текст джерелаKatarahweire, Marriette, Engineer Bainomugisha, and Khalid A. Mughal. "Data Classification for Secure Mobile Health Data Collection Systems." Development Engineering 5 (2020): 100054. http://dx.doi.org/10.1016/j.deveng.2020.100054.
Повний текст джерелаAhmed, Kazi Wasif, Omit Chanda, Noman Mohammed, and Yang Wang. "Obfuscated image classification for secure image-centric friend recommendation." Sustainable Cities and Society 41 (August 2018): 940–48. http://dx.doi.org/10.1016/j.scs.2017.10.001.
Повний текст джерелаTawalbeh, Lo’ai, Nour S. Darwazeh, Raad S. Al-Qassas, and Fahd AlDosari. "A Secure Cloud Computing Model based on Data Classification." Procedia Computer Science 52 (2015): 1153–58. http://dx.doi.org/10.1016/j.procs.2015.05.150.
Повний текст джерелаBalachander, J., and E. Ramanujam. "Rule based Medical Content Classification for Secure Remote Health Monitoring." International Journal of Computer Applications 165, no. 4 (May 17, 2017): 21–26. http://dx.doi.org/10.5120/ijca2017913852.
Повний текст джерелаXue, Liang, Dongxiao Liu, Cheng Huang, Xiaodong Lin, and Xuemin Sherman Shen. "Secure and Privacy-Preserving Decision Tree Classification with Lower Complexity." Journal of Communications and Information Networks 5, no. 1 (March 2020): 16–25. http://dx.doi.org/10.23919/jcin.2020.9055107.
Повний текст джерелаLiu, Jiasen, Chao Wang, Zheng Tu, Xu An Wang, Chuan Lin, and Zhihu Li. "Secure KNN Classification Scheme Based on Homomorphic Encryption for Cyberspace." Security and Communication Networks 2021 (November 3, 2021): 1–12. http://dx.doi.org/10.1155/2021/8759922.
Повний текст джерелаResende, Amanda, Davis Railsback, Rafael Dowsley, Anderson C. A. Nascimento, and Diego F. Aranha. "Fast Privacy-Preserving Text Classification Based on Secure Multiparty Computation." IEEE Transactions on Information Forensics and Security 17 (2022): 428–42. http://dx.doi.org/10.1109/tifs.2022.3144007.
Повний текст джерелаTangod, Kiran, and Gururaj Kulkarni. "Secure Communication through MultiAgent System-Based Diabetes Diagnosing and Classification." Journal of Intelligent Systems 29, no. 1 (June 29, 2018): 703–18. http://dx.doi.org/10.1515/jisys-2017-0353.
Повний текст джерелаSamanthula, Bharath K., Yousef Elmehdwi, and Wei Jiang. "k-Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data." IEEE Transactions on Knowledge and Data Engineering 27, no. 5 (May 1, 2015): 1261–73. http://dx.doi.org/10.1109/tkde.2014.2364027.
Повний текст джерелаUdhaya, P., and G. Manikandan. "An enhanced approach for secure pattern classification in adversarial environment." Contemporary Engineering Sciences 8 (2015): 533–38. http://dx.doi.org/10.12988/ces.2015.5269.
Повний текст джерелаZhu, Youwen, Xingxin Li, Jian Wang, Yining Liu, and Zhiguo Qu. "Practical Secure Naïve Bayesian Classification Over Encrypted Big Data in Cloud." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 683–703. http://dx.doi.org/10.1142/s0129054117400135.
Повний текст джерелаYoo, Yongjae, Jihwan Suh, Jeongyeup Paek, and Saewoong Bahk. "Secure Region Detection Using Wi-Fi CSI and One-Class Classification." IEEE Access 9 (2021): 65906–13. http://dx.doi.org/10.1109/access.2021.3076176.
Повний текст джерелаS. Almasoud, Ahmed, Abdelzahir Abdelmaboud, Faisal S. Alsubaei, Manar Ahmed Hamza, Ishfaq Yaseen, Mohammed Abaker, Abdelwahed Motwakel, and Mohammed Rizwanullah. "Deep Learning with Image Classification Based Secure CPS for Healthcare Sector." Computers, Materials & Continua 72, no. 2 (2022): 2633–48. http://dx.doi.org/10.32604/cmc.2022.024619.
Повний текст джерелаIDRIS, ISMAILA, UMAR MAJIGI MUHAMMAD, MUHAMMAD ABDULHAMID SHAFI'I, OLALERE MORUFU, BASHIR ABDULLAHI MUHAMMAD, and O. NWAOCHA VIVIAN. "SECURE UNIVERSITY NETWORK ARCHITECTURE, VULNERABILITIES, RISK PRIORITY LEVEL CLASSIFICATION AND COUNTERMEASURES." i-manager’s Journal on Wireless Communication Networks 7, no. 2 (2018): 42. http://dx.doi.org/10.26634/jwcn.7.2.15604.
Повний текст джерелаYang, Haomiao, Shaopeng Liang, Jianbing Ni, Hongwei Li, and Xuemin Sherman Shen. "Secure and Efficient k NN Classification for Industrial Internet of Things." IEEE Internet of Things Journal 7, no. 11 (November 2020): 10945–54. http://dx.doi.org/10.1109/jiot.2020.2992349.
Повний текст джерелаLiu, Yi, Yu Luo, Youwen Zhu, Yang Liu, and Xingxin Li. "Secure multi-label data classification in cloud by additionally homomorphic encryption." Information Sciences 468 (November 2018): 89–102. http://dx.doi.org/10.1016/j.ins.2018.07.054.
Повний текст джерелаDeng, Guoqiang, Min Tang, Yuhao Zhang, Ying Huang, and Xuefeng Duan. "Privacy-Preserving Outsourced Artificial Neural Network Training for Secure Image Classification." Applied Sciences 12, no. 24 (December 14, 2022): 12873. http://dx.doi.org/10.3390/app122412873.
Повний текст джерелаKodati, Sarangam, Kumbala Pradeep Reddy, Thotakura Veerananna, S. Govinda Rao, and G. Anil Kumar. "Security Framework Connection Assistance for IoT Device Secure Data communication." E3S Web of Conferences 309 (2021): 01061. http://dx.doi.org/10.1051/e3sconf/202130901061.
Повний текст джерелаZuber, Martin, and Renaud Sirdey. "Efficient homomorphic evaluation of k-NN classifiers." Proceedings on Privacy Enhancing Technologies 2021, no. 2 (January 29, 2021): 111–29. http://dx.doi.org/10.2478/popets-2021-0020.
Повний текст джерелаSchoppmann, Phillipp, Lennart Vogelsang, Adrià Gascón, and Borja Balle. "Secure and Scalable Document Similarity on Distributed Databases: Differential Privacy to the Rescue." Proceedings on Privacy Enhancing Technologies 2020, no. 2 (April 1, 2020): 209–29. http://dx.doi.org/10.2478/popets-2020-0024.
Повний текст джерелаTarik, Boudheb, and Elberrichi Zakaria. "Privacy Preserving Classification of Biomedical Data With Secure Removing of Duplicate Records." International Journal of Organizational and Collective Intelligence 8, no. 3 (July 2018): 41–58. http://dx.doi.org/10.4018/ijoci.2018070104.
Повний текст джерелаKjamilji, Artrim, Arben Idrizi, Shkurte Luma-Osmani, and Ferihane Zenuni-Kjamilji. "Secure Naïve Bayes Classification without Loss of Accuracy with Application to Breast Cancer Prediction." Proceeding International Conference on Science and Engineering 3 (April 30, 2020): 397–403. http://dx.doi.org/10.14421/icse.v3.536.
Повний текст джерелаSumana M. and Hareesha K.S. "Accurate Classification Models for Distributed Mining of Privately Preserved Data." International Journal of Information Security and Privacy 10, no. 4 (October 2016): 58–73. http://dx.doi.org/10.4018/ijisp.2016100104.
Повний текст джерелаAlrayes, Fatma S., Saud S. Alotaibi, Khalid A. Alissa, Mashael Maashi, Areej Alhogail, Najm Alotaibi, Heba Mohsen, and Abdelwahed Motwakel. "Artificial Intelligence-Based Secure Communication and Classification for Drone-Enabled Emergency Monitoring Systems." Drones 6, no. 9 (August 26, 2022): 222. http://dx.doi.org/10.3390/drones6090222.
Повний текст джерелаAparna, R., and B. B. Amberker. "Analysis of Key Management Schemes for Secure Group Communication and Their Classification." Journal of Computing and Information Technology 17, no. 2 (2009): 203. http://dx.doi.org/10.2498/cit.1001215.
Повний текст джерелаTangod, Kiran, and Gururaj Kulkarni. "Secure agent-based diagnosis and classification using optimal kernel support vector machine." International Journal of Biomedical Engineering and Technology 37, no. 1 (2021): 25. http://dx.doi.org/10.1504/ijbet.2021.117513.
Повний текст джерелаKulkarni, Gururaj, and Kiran Tangod. "Secure Agent Based Diagnosis and Classification Using Optimal Kernel Support Vector Machine." International Journal of Biomedical Engineering and Technology 1, no. 1 (2018): 1. http://dx.doi.org/10.1504/ijbet.2018.10013947.
Повний текст джерелаPak, Wooguil. "Design of Integrated packet classification algorithm for Supporting High Performance Secure Routers." Journal of Security Engineering 15, no. 2 (April 30, 2018): 103–18. http://dx.doi.org/10.14257/jse.2018.04.02.
Повний текст джерелаWu, Wei, Jian Liu, Hong Rong, Huimei Wang, and Ming Xian. "Efficient k-Nearest Neighbor Classification Over Semantically Secure Hybrid Encrypted Cloud Database." IEEE Access 6 (2018): 41771–84. http://dx.doi.org/10.1109/access.2018.2859758.
Повний текст джерелаKaur, Kulwinder, and Vikas Zandu. "A Secure Data Classification Model in Cloud Computing Using Machine Learning Approach." International Journal of Grid and Distributed Computing 9, no. 8 (August 31, 2016): 13–22. http://dx.doi.org/10.14257/ijgdc.2016.9.8.02.
Повний текст джерелаJ., Swathy, and Surya S.R. "Review on k -Nearest Neighbor Classification over Semantically Secure Encrypted Relational Data." International Journal of Computer Applications 133, no. 8 (January 15, 2016): 1–4. http://dx.doi.org/10.5120/ijca2016907988.
Повний текст джерелаLiu, Lin, Jinshu Su, Ximeng Liu, Rongmao Chen, Kai Huang, Robert H. Deng, and Xiaofeng Wang. "Toward Highly Secure Yet Efficient KNN Classification Scheme on Outsourced Cloud Data." IEEE Internet of Things Journal 6, no. 6 (December 2019): 9841–52. http://dx.doi.org/10.1109/jiot.2019.2932444.
Повний текст джерелаSun, Maohua, and Ruidi Yang. "An efficient secure k nearest neighbor classification protocol with high‐dimensional features." International Journal of Intelligent Systems 35, no. 11 (August 30, 2020): 1791–813. http://dx.doi.org/10.1002/int.22272.
Повний текст джерелаJararweh, Yaser, Mahmoud Al-Ayyoub, Lo’ai Tawalbeh, Ala’ Darabseh, and Houbing Song. "Software-defined systems support for secure cloud computing based on data classification." Annals of Telecommunications 72, no. 5-6 (November 8, 2016): 335–45. http://dx.doi.org/10.1007/s12243-016-0549-0.
Повний текст джерелаA. Alissa, Khalid, Mohammed Maray, Areej A. Malibari, Sana Alazwari, Hamed Alqahtani, Mohamed K. Nour, Marwa Obbaya, Mohamed A. Shamseldin та Mesfer Al Duhayyim. "Optimal Deep Learning Model Enabled Secure UAV Classification for營ndustry 4.0". Computers, Materials & Continua 74, № 3 (2023): 5349–67. http://dx.doi.org/10.32604/cmc.2023.033532.
Повний текст джерелаLokhande, Meghana P., Dipti Durgesh Patil, Lalit V. Patil, and Mohammad Shabaz. "Machine-to-Machine Communication for Device Identification and Classification in Secure Telerobotics Surgery." Security and Communication Networks 2021 (August 27, 2021): 1–16. http://dx.doi.org/10.1155/2021/5287514.
Повний текст джерелаArkhipova, Anastasiya, and Danila Karevskiy. "Honeypot as a tool for creating an effective secure system." Digital Technology Security, no. 2 (June 25, 2021): 122–35. http://dx.doi.org/10.17212/2782-2230-2021-2-122-135.
Повний текст джерелаRiggio, Giacomo, Angelo Gazzano, Borbála Zsilák, Beatrice Carlone, and Chiara Mariti. "Quantitative Behavioral Analysis and Qualitative Classification of Attachment Styles in Domestic Dogs: Are Dogs with a Secure and an Insecure-Avoidant Attachment Different?" Animals 11, no. 1 (December 23, 2020): 14. http://dx.doi.org/10.3390/ani11010014.
Повний текст джерелаKumar, Abhinav, Sanjay Kumar Singh, K. Lakshmanan, Sonal Saxena, and Sameer Shrivastava. "A Novel Cloud-Assisted Secure Deep Feature Classification Framework for Cancer Histopathology Images." ACM Transactions on Internet Technology 21, no. 2 (June 2021): 1–22. http://dx.doi.org/10.1145/3424221.
Повний текст джерелаGongada, Sandhya Rani, Muktevi Chakravarthy, and Bhukya Mangu. "Power system contingency classification using machine learning technique." Bulletin of Electrical Engineering and Informatics 11, no. 6 (December 1, 2022): 3091–98. http://dx.doi.org/10.11591/eei.v11i6.4031.
Повний текст джерела