Skip to Content

17,454 Results Found

  • Article
  • Open Access
3 Citations
3,613 Views
19 Pages

The recent COVID-19 pandemic has hit humanity very hard in ways rarely observed before. In this digitally connected world, the health informatics and investigation domains (both public and private) lack a robust framework to enable rapid investigatio...

  • Article
  • Open Access
2 Citations
932 Views
21 Pages

15 July 2025

Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification. Public verification allo...

  • Article
  • Open Access
1 Citations
2,493 Views
19 Pages

25 November 2022

With the rapid development of science and technology, enterprises will provide their customers with cloud data storage services. These massive amounts of data bring huge management costs to enterprises. Therefore, enterprises choose to store their da...

  • Article
  • Open Access
5 Citations
4,998 Views
26 Pages

A Cloud Microservices Architecture for Data Integrity Verifiability Based on Blockchain

  • Juan Carlos López-Pimentel,
  • Luis Alberto Morales-Rosales and
  • Ignacio Algredo-Badillo

7 March 2022

The current digital age, mainly characterized by an economy based upon information technology, demands a data integrity service, even more so because organizations and companies are migrating their services over the cloud. This is not a simple task;...

  • Article
  • Open Access
17 Citations
5,539 Views
23 Pages

Towards a Catalogue of Self-Sovereign Identity Design Patterns

  • Špela Čučko,
  • Vid Keršič and
  • Muhamed Turkanović

26 April 2023

Self-sovereign identity (SSI) is a user-centric, decentralised identity approach that provides a means for identification, authentication, and authorisation without the involvement of external entities, responsible for identity provisioning and manag...

  • Article
  • Open Access
3 Citations
2,165 Views
24 Pages

With the rapid development of cloud storage and cloud computing technology, users can upload data to the cloud and share it with other users. However, the integrity and the privacy of data files at the cloud service provider suffer from challenges. I...

  • Article
  • Open Access
6 Citations
2,948 Views
20 Pages

Achieving Verifiable Decision Tree Prediction on Hybrid Blockchains

  • Moxuan Fu,
  • Chuan Zhang,
  • Chenfei Hu,
  • Tong Wu,
  • Jinyang Dong and
  • Liehuang Zhu

13 July 2023

Machine learning has become increasingly popular in academic and industrial communities and has been widely implemented in various online applications due to its powerful ability to analyze and use data. Among all the machine learning models, decisio...

  • Article
  • Open Access
623 Views
27 Pages

Searchable Encryption (SE) schemes enable data users to securely search over outsourced encrypted data stored in the cloud. To support fine-grained access control, Attribute-Based Encryption with Keyword Search (ABKS) extends SE by associating access...

  • Article
  • Open Access
724 Views
30 Pages

25 November 2025

To address the issues of privacy-utility imbalance, insufficient incentives, and lack of verifiable computation in current medical data sharing, this paper proposes a blockchain-based fair verification and adaptive differential privacy mechanism. The...

  • Article
  • Open Access
1 Citations
990 Views
16 Pages

GHEFL: Grouping Based on Homomorphic Encryption Validates Federated Learning

  • Yulin Kang,
  • Wuzheng Tan,
  • Linlin Fan,
  • Yinuo Chen,
  • Xinbin Lai and
  • Jian Weng

15 March 2025

Federated learning is a powerful tool for securing participants’ private data due to its ability to make data “available but not visible”. In recent years, federated learning has been enhanced by the emergence of multi-weight aggreg...

  • Article
  • Open Access
7 Citations
3,692 Views
19 Pages

A Blockchain-Based Privacy-Preserving and Fair Data Transaction Model in IoT

  • Wei Zhou,
  • De Zhang,
  • Guangjie Han,
  • Wenyin Zhu and
  • Xupeng Wang

16 November 2023

The rapid development of the Internet of Things (IoT) has resulted in vast amounts of widely distributed data. Sharing these data can spur innovative advancements and enhance service quality. However, conventional data-sharing methods often involve t...

  • Article
  • Open Access
989 Views
21 Pages

27 August 2025

Proof of Storage-Time (PoST) is the core verification mechanism for blockchain data storage, ensuring the integrity and continuous availability of data throughout the storage period. Although the current mainstream Compact Proofs of Storage-Time (cPo...

  • Article
  • Open Access
10 Citations
3,423 Views
22 Pages

A Strong Designated Verifier Proxy Re-Signature Scheme for IoT Environments

  • Xiao-Dong Yang,
  • Li-Kun Xiao,
  • Chun-Lin Chen and
  • Cai-Fen Wang

2 November 2018

With the rapid popularization of the Internet of Things (IoT) in our daily lives, the communication security and identity privacy of IoT devices must be ensured. However, traditional authentication mechanisms utilized in IoT cannot completely ensure...

  • Article
  • Open Access
2,405 Views
26 Pages

6 August 2025

This work contextualizes the possibility of deriving a unifying artificial intelligence framework by walking in the footsteps of General, Explainable, and Verified Artificial Intelligence (GEVAI): by considering explainability not only at the level o...

  • Article
  • Open Access
1 Citations
1,678 Views
26 Pages

A Secure Certificate-Based Data Integrity Auditing Protocol with Cloud Service Providers

  • Yuan Tian,
  • Xuan Zhou,
  • Tanping Zhou,
  • Weidong Zhong,
  • Ruifeng Li and
  • Xiaoyuan Yang

25 June 2024

With the surge in cloud storage popularity, more individuals are choosing to store large amounts of data on remote cloud service providers (CSPs) to save local storage resources. However, users’ primary worries revolve around maintaining data i...

  • Article
  • Open Access
7 Citations
3,337 Views
19 Pages

21 June 2024

As Internet of Things (IoT) technology continues to advance at a rapid pace, smart devices have permeated daily life. Service providers are actively collecting copious numbers of user data, with the aim of refining machine learning models to elevate...

  • Article
  • Open Access
1 Citations
2,051 Views
12 Pages

4 November 2022

One of the most common approaches for enhancing network performance is to retrieve data from nearby data holders that have previously obtained the desired data, not only from the original data source itself. In this case, since a data receiver cannot...

  • Article
  • Open Access
876 Views
9 Pages

18 November 2025

Data spaces are digital realms of data and information shared between stakeholders and peer groups. They underpin several developments in sectors ranging from the automotive industry, through social sciences, to governmental networks. Digital traceab...

  • Article
  • Open Access
319 Views
29 Pages

Trustworthy Identity and Access Management (IAM) is a foundational requirement for federated data trading platforms, yet existing solutions often rely on centralized Identity Providers (IdPs), lack cross-border interoperability, and offer limited sup...

  • Article
  • Open Access
2 Citations
2,946 Views
16 Pages

23 September 2024

The online services provided by the Service Provider (SP) have brought significant convenience to people’s lives. Nowadays, people have grown accustomed to obtaining diverse services via the Internet. However, some SP utilize or even tamper wit...

  • Article
  • Open Access
8 Citations
3,291 Views
21 Pages

Data-Driven Intelligent Platforms—Design of Self-Sovereign Data Trust Systems

  • Ana Balan,
  • Andi Gabriel Tan,
  • Karima Kourtit and
  • Peter Nijkamp

13 June 2023

Urban areas provide the seedbed conditions for a variety of agglomeration advantages, including incubator conditions for the ICT sector. This study aims to present the foundations for a data-driven digital architecture based on the notion of open acc...

  • Article
  • Open Access
2 Citations
3,918 Views
17 Pages

25 May 2023

Outliers are often present in data and many algorithms exist to find these outliers. Often we can verify these outliers to determine whether they are data errors or not. Unfortunately, checking such points is time-consuming and the underlying issues...

  • Article
  • Open Access
514 Views
28 Pages

27 November 2025

Frequent data sharing in Vehicular Ad Hoc Networks (VANETs) necessitates a robust foundation of secure access control to ensure data security. Existing ciphertext-policy attribute-based encryption schemes are constrained by the performance bottleneck...

  • Article
  • Open Access
6 Citations
2,180 Views
10 Pages

3 October 2021

We consider the problems of the authorship of literary texts in the framework of the quantitative study of literature. This article proposes a methodology for authorship attribution of literary texts based on the use of data compressors. Unlike other...

  • Article
  • Open Access
409 Views
25 Pages

Towards Energy Efficiency: A Framework for Measuring, Reporting and Verifying Energy Data from Smart Buildings

  • Julia Köhlke,
  • Anna Brüning-Pfeiffer,
  • Viktor Dmitriyev,
  • Franziska Tucci and
  • Jad Asswad

13 February 2026

Measurement, Reporting and Verification (MRV) concepts have emerged as a means for reviewing and ensuring the effectiveness of energy efficiency measures (EEMs) in smart buildings. Nevertheless, high technological and regulatory demands imposed by th...

  • Article
  • Open Access
1 Citations
795 Views
24 Pages

3 November 2025

Vector geographic data require strict preservation of coordinate precision and topological integrity. However, their open transmission poses simultaneous challenges for copyright protection and data security. To address these issues, this study propo...

  • Article
  • Open Access
8 Citations
2,899 Views
16 Pages

Physiologically based pharmacokinetic and absorption modeling are being used by industry and regulatory bodies to address various scientifically challenging questions. While there is high confidence in the prediction of exposure for the BCS class I d...

  • Article
  • Open Access
5 Citations
3,004 Views
15 Pages

Advances and cost reductions in Light Detection and Ranging (LiDAR) sensor technology have allowed for their implementation in detecting vehicles, cyclists, and pedestrians at signalized intersections. Most LiDAR use cases have focused on safety anal...

  • Article
  • Open Access
1 Citations
247 Views
30 Pages

20 January 2026

The entire system collapses due to the issues of inadequate centralized storage capacity, poor scalability, low storage efficiency, and susceptibility to single point of failure brought on by huge power consumption data in the smart grid; thus, an al...

  • Article
  • Open Access
19 Citations
5,958 Views
24 Pages

31 August 2020

Recent developments in cloud computing allow data to be securely shared between users. This can be used to improve the quality of life of patients and medical staff in the Internet of Medical Things (IoMT) environment. However, in the IoMT cloud envi...

  • Article
  • Open Access
6 Citations
4,916 Views
24 Pages

Using Machine Learning for Remote Behaviour Classification—Verifying Acceleration Data to Infer Feeding Events in Free-Ranging Cheetahs

  • Lisa Giese,
  • Jörg Melzheimer,
  • Dirk Bockmühl,
  • Bernd Wasiolka,
  • Wanja Rast,
  • Anne Berger and
  • Bettina Wachter

11 August 2021

Behavioural studies of elusive wildlife species are challenging but important when they are threatened and involved in human-wildlife conflicts. Accelerometers (ACCs) and supervised machine learning algorithms (MLAs) are valuable tools to remotely de...

  • Article
  • Open Access
230 Views
14 Pages

Efficient and Verified Research Data Extraction with LLM

  • Aleksandr Serdiukov,
  • Vitaliy Dravgelis,
  • Daniil Smutin,
  • Amir Taldaev,
  • Artem Ivanov,
  • Leonid Adonin and
  • Sergey Muravyov

13 March 2026

Large language models (LLMs) hold promise for automated extraction of structured biological information from scientific literature, yet their reliability in some domain-specific tasks, such as DNA probe parsing remains underexplored. We developed a v...

  • Review
  • Open Access
18 Citations
6,328 Views
36 Pages

31 August 2020

Experiments based on metabolomics represent powerful approaches to the experimental verification of the integrity of food. In particular, high-resolution non-targeted analyses, which are carried out by means of liquid chromatography-mass spectrometry...

  • Article
  • Open Access
2 Citations
1,998 Views
23 Pages

18 July 2024

Environmental regulation (ER) and internet development (ID) are important options for addressing the environmental health crisis, but the actual impact of both on public health outcomes (PHOs) is still unclear. This study aims to explain how and to w...

  • Article
  • Open Access
12 Citations
3,604 Views
19 Pages

Distributed Data Integrity Verification Scheme in Multi-Cloud Environment

  • Elizabeth Nathania Witanto,
  • Brian Stanley and
  • Sang-Gon Lee

2 February 2023

Most existing data integrity auditing protocols in cloud storage rely on proof of probabilistic data possession. Consequently, the sampling rate of data integrity verification is low to prevent expensive costs to the auditor. However, in the case of...

  • Article
  • Open Access
5 Citations
3,929 Views
14 Pages

2 November 2022

Validating and improving the quality of global address data are important tasks in a modern society where exchanges between countries are due to active Free Trade Agreements (FTAs) and e-commerce. Addresses may be constructed with different systems f...

  • Article
  • Open Access
276 Views
25 Pages

Strong Non-Transferability from Randomizable Universal Designated Verifier Signatures

  • Magdalena Bertram,
  • Benjamin Zengin,
  • Nicolas Buchmann and
  • Marian Margraf

In the context of digital certification systems, the demand for privacy-preserving authentication is increasingly vital, particularly for critical applications that involve sensitive personal data. Traditional digital signatures provide a robust mean...

  • Article
  • Open Access
14 Citations
5,554 Views
22 Pages

Often clients (e.g., sensors, organizations) need to outsource joint computations that are based on some joint inputs to external untrusted servers. These computations often rely on the aggregation of data collected from multiple clients, while the c...

  • Article
  • Open Access
8 Citations
5,204 Views
17 Pages

Verifiable Delay Function and Its Blockchain-Related Application: A Survey

  • Qiang Wu,
  • Liang Xi,
  • Shiren Wang,
  • Shan Ji,
  • Shenqing Wang and
  • Yongjun Ren

4 October 2022

The concept of verifiable delay functions has received attention from researchers since it was first proposed in 2018. The applications of verifiable delay are also widespread in blockchain research, such as: computational timestamping, public random...

  • Article
  • Open Access
17 Citations
4,832 Views
26 Pages

The purpose of this study is to increase interest in health as human life is extended in modern society. Hence, many people in hospitals produce much medical data (EMR, PACS, OCS, EHR, MRI, X-ray) after treatment. Medical data are stored as structure...

  • Article
  • Open Access
2 Citations
2,943 Views
23 Pages

Faster Data Forwarding in Content-Centric Network via Overlaid Packet Authentication Architecture

  • Taek-Young Youn,
  • Joongheon Kim,
  • David Mohaisen and
  • Seog Chung Seo

21 October 2020

Content-Centric Networking (CCN) is one of the emerging paradigms for the future Internet, which shifts the communication paradigm from host-centric to data-centric. In CCN, contents are delivered by their unique names, and a public-key-based signatu...

  • Article
  • Open Access
8 Citations
3,733 Views
20 Pages

Methods of Sandy Land Detection in a Sparse-Vegetation Scene Based on the Fusion of HJ-2A Hyperspectral and GF-3 SAR Data

  • Yi Li,
  • Junjun Wu,
  • Bo Zhong,
  • Xiaoliang Shi,
  • Kunpeng Xu,
  • Kai Ao,
  • Bin Sun,
  • Xiangyuan Ding,
  • Xinshuang Wang and
  • Mengqi Shi
  • + 3 authors

1 March 2022

Accurate identification of sandy land plays an important role in sandy land prevention and control. It is difficult to identify the nature of sandy land due to vegetation covering the soil in the sandy area. Therefore, HJ-2A hyperspectral data and GF...

  • Article
  • Open Access
2 Citations
1,509 Views
24 Pages

4 April 2025

The proliferation of numerous portable mobile devices has made mobile crowd-sensing (MCS) systems a promising new trend. Traditional MCS systems typically outsource sensing tasks to the data aggregator (e.g., cloud server). They collect and analyze t...

  • Feature Paper
  • Article
  • Open Access
366 Views
23 Pages

10 February 2026

Digital product passports outline information about a product’s lifecycle, circularity, and sustainability-related data. Sustainability data contains claims about carbon footprint, recycled material composition, ethical sourcing of production m...

  • Article
  • Open Access
4 Citations
3,184 Views
15 Pages

31 October 2022

Before the transaction data in the blockchain is successfully linked, its signature must be publicly verified by a large number of nodes in the blockchain, which is also one of the ways to leak transaction information. To alleviate the contradiction...

  • Article
  • Open Access
8 Citations
4,029 Views
16 Pages

18 March 2020

The objective of this study was to verify the feasibility of mouse data exposure by deriving features to improve the accuracy of a mouse data attack technique using machine learning models. To improve the accuracy, the feature appearing between the m...

  • Article
  • Open Access
7 Citations
5,848 Views
18 Pages

Monitoring Water Quality Parameters Using Sentinel-2 Data: A Case Study in the Weihe River Basin (China)

  • Tieming Liu,
  • Zhao Guo,
  • Xiaoping Li,
  • Teng Xiao,
  • Jiaxin Liu and
  • Yuanzhi Zhang

10 August 2024

Based on Sentinel-2 multispectral image data and existing research results, the comprehensive water quality index (CWQI), NH4+-N, and total phosphorus (TP) in the Weihe River and its tributaries were estimated. Furthermore, a verified model was obtai...

  • Article
  • Open Access
3 Citations
2,840 Views
25 Pages

20 September 2023

With the rapid development of Internet of Things technology and cloud computing technology, all industries need to outsource massive data to third-party clouds for storage in order to reduce storage and computing costs. Verifiable and dynamic searcha...

  • Article
  • Open Access
23 Citations
5,677 Views
61 Pages

Phylogeny, Global Biogeography and Pleomorphism of Zanclospora

  • Martina Réblová,
  • Miroslav Kolařík,
  • Jana Nekvindová,
  • Andrew N. Miller and
  • Margarita Hernández-Restrepo

Zanclospora (Chaetosphaeriaceae) is a neglected, phialidic dematiaceous hyphomycete with striking phenotypic heterogeneity among its species. Little is known about its global biogeography due to its extreme scarcity and lack of records verified by mo...

of 350