Showing 1,281 - 1,300 results of 9,720 for search '"Securities ', query time: 0.07s Refine Results
  1. 1281
  2. 1282
  3. 1283
  4. 1284
  5. 1285
  6. 1286
  7. 1287
  8. 1288

    Efficient and secure multi-user outsourced image retrieval scheme with access control by Fuyuan SONG, Zheng QIN, Jixin ZHANG, Yu LIU

    Published 2021-10-01
    “…In the cloud-based image retrieval services, the cloud server may not be fully trusted in which may arise privacy concerns.Some privacy-preserving image retrieval schemes have been proposed to protect image privacy.However, the traditional privacy-preserving image retrieval schemes have some weaknesses, such as inefficient and single-user setting.Therefore, an efficient and secure multi-user outsourced image retrieval (EMIR) scheme with access control was proposed.EMIR utilized matrix decomposition and proxy re-encryption to achieve multi-user outsourced image retrieval.By leveraging the techniques of one-time pad and matrix transformation, EMIR supported efficient and secure image retrieval based on Euclidean distance similarity in a privacy-preserving manner.In addition, EMIR applied locality sensitive hashing (LSH) to build searchable indexes in a privacy-preserving manner, which could improve the image retrieval performance.Specifically, a lightweight access control strategy by using role-based polynomial function was designed to authorize the legality of the query user.Security analysis shows that EMIR can protect the confidentiality of the images and the queries.The extensive experiments demonstrate that EMIR achieves efficient image retrieval.…”
    Get full text
    Article
  9. 1289
  10. 1290

    The Effect of HIV/AIDS Scourge on Food Security in Nyabbani Subcounty, Kitagwenda District. by Ainembabazi, Docus

    Published 2023
    “…The purpose of this research was to assess, analyze, find out, and gather the effect of HIV/AIDS scourge on food security in Nyabbani sub-county, Kitagwenda district.…”
    Get full text
    Thesis
  11. 1291
  12. 1292
  13. 1293
  14. 1294
  15. 1295
  16. 1296
  17. 1297
  18. 1298
  19. 1299

    Cyber security entity recognition method based on residual dilation convolution neural network by Bo XIE, Guowei SHEN, Chun GUO, Yan ZHOU, Miao YU

    Published 2020-10-01
    “…In recent years,cybersecurity threats have increased,and data-driven security intelligence analysis has become a hot research topic in the field of cybersecurity.In particular,the artificial intelligence technology represented by the knowledge graph can provide support for complex cyberattack detection and unknown cyberattack detection in multi-source heterogeneous threat intelligence data.Cybersecurity entity recognition is the basis for the construction of threat intelligence knowledge graphs.The composition of security entities in open network text data is very complex,which makes traditional deep learning methods difficult to identify accurately.Based on the pre-training language model of BERT (pre-training of deep bidirectional transformers),a cybersecurity entity recognition model BERT-RDCNN-CRF based on residual dilation convolutional neural network and conditional random field was proposed.The BERT model was used to train the character-level feature vector representation.Combining the residual convolution and the dilation neural network model to effectively extract the important features of the security entity,and finally obtain the BIO annotation of each character through CRF.Experiments on the large-scale cybersecurity entity annotation dataset constructed show that the proposed method achieves better results than the LSTM-CRF model,the BiLSTM-CRF model and the traditional entity recognition model.…”
    Get full text
    Article
  20. 1300