Blar i Institutt for informasjonssikkerhet og kommunikasjonsteknologi på tidsskrift "IEEE Access"
Viser treff 1-20 av 36
-
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI
(Peer reviewed; Journal article, 2024)The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ... -
Advancing Fake News Detection: Hybrid Deep Learning With FastText and Explainable AI
(Journal article; Peer reviewed, 2024)The widespread propagation of misinformation on social media platforms poses a significant concern, prompting substantial endeavors within the research community to develop robust detection solutions. Individuals often ... -
Adversarial Attacks against Face Recognition: A Comprehensive Study
(Peer reviewed; Journal article, 2021)Face recognition (FR) systems have demonstrated reliable verification performance, suggesting suitability for real-world applications ranging from photo tagging in social media to automated border control (ABC). In an ... -
Audio-Visual Biometric Recognition and Presentation Attack Detection: A Comprehensive Survey
(Peer reviewed; Journal article, 2021)Biometric recognition is a trending technology that uses unique characteristics data to identify or verify/authenticate security applications. Amidst the classically used biometrics, voice and face attributes are the most ... -
Blockchain State Channels: A State of the Art
(Peer reviewed; Journal article, 2021)Blockchain technology has been quite popular during recent years and it finally seems to present a significant rise with respect to its use for real-world applications. This advancement has brought up a critical challenge ... -
Bloom’s Learning Outcomes’ Automatic Classification Using LSTM and Pretrained Word Embeddings
(Peer reviewed; Journal article, 2021)Bloom’s taxonomy is a popular model to classify educational learning objectives into different learning levels for three domains including cognitive, affective and psycho motor. Each domain is further detailed into different ... -
BRAKE: Biometric Resilient Authenticated Key Exchange
(Journal article; Peer reviewed, 2024)Biometric data are uniquely suited for connecting individuals to their digital identities. Deriving cryptographic key exchange from successful biometric authentication therefore gives an additional layer of trust compared ... -
Compact and Mobile Full-Field Optical Coherence Tomography Sensor for Subsurface Fingerprint Imaging
(Peer reviewed; Journal article, 2020)Conventional fingerprint sensors that are deployed in real-life applications lack the ability to peer inside a finger beyond the external surface. Subsurface information can provide complimentary biometric characteristics ... -
Comparing the Scalability of Communication Networks and Systems
(Journal article; Peer reviewed, 2023)Scalability is often mentioned in literature, but a stringent definition is missing. In particular, there is no general scalability assessment which clearly indicates whether a system scales or not or whether a system ... -
Construction of Human Motivational Profiles by Observation for Risk Analysis
(Peer reviewed; Journal article, 2020)This study aimed at analyzing the extent to which publicly observable pieces of information representing stakeholders’ past and current choices can be utilized for the construction of motivational profiles. Motivation is ... -
Deep Composite Face Image Attacks: Generation, Vulnerability and Detection
(Peer reviewed; Journal article, 2023)Face manipulation attacks have drawn the attention of biometric researchers because of their vulnerability to Face Recognition Systems (FRS). This paper proposes a novel scheme to generate Composite Face Image Attacks ... -
Deep Face Age Progression: A Survey
(Peer reviewed; Journal article, 2021) -
Delay and Delay-Constrained Throughput Performance of a Wireless-Powered Communication System
(Journal article; Peer reviewed, 2017)In this paper, the delay and delay-constrained throughput performance of a point-to-point wireless-powered communication system is investigated. In this system, the wireless-powered node, e.g., a user equipment (UE), ... -
Differential Privacy Preservation in Robust Continual Learning
(Peer reviewed; Journal article, 2022)Enhancing the privacy of machine learning (ML) algorithms has become crucial with the presence of different types of attacks on AI applications. Continual learning (CL) is a branch of ML with the aim of learning a set of ... -
E2F-GAN: Eyes-to-Face Inpainting via Edge-Aware Coarse-to-Fine GANs
(Peer reviewed; Journal article, 2022)Face inpainting is a challenging task aiming to fill the damaged or masked regions in face images with plausibly synthesized contents. Based on the given information, the reconstructed regions should look realistic and ... -
Effect of Communication Failures on State Estimation of 5G-Enabled Smart Grid
(Peer reviewed; Journal article, 2020)Information and Communication Technologies (ICT), Wide Area Measurement Systems (WAMS) and state estimation represent the key-tools for achieving a reliable and accurate knowledge of the power grid, and represent the ... -
Enabling the Internet of Arctic Things with Freely-Drifting Small-Satellite Swarms
(Journal article; Peer reviewed, 2018)The widespread deployment of Internet-capable devices, also known as the Internet of Things (IoT), reaches even the most remote areas of the planet, including the Arctic. However, and despite the vast scientific and economic ... -
Enhancing Multilingual Hate Speech Detection: From Language-Specific Insights to Cross-Linguistic Integration
(Journal article; Peer reviewed, 2024)The rise of social media has enabled individuals with biased perspectives to spread hate speech, directing it toward individuals based on characteristics such as race, gender, religion, or sexual orientation. Constructive ... -
Expanded combinatorial designs as tool to model network slicing in 5G
(Journal article; Peer reviewed, 2019)The network slice management function (NSMF) in 5G has a task to configure the network slice instances and to combine network slice subnet instances from the new-generation radio access network and the core network into ... -
Fog Computing in Healthcare – A Review and Discussion
(Journal article; Peer reviewed, 2017)Fog computing is an architectural style in which network components between devices and the cloud execute application-specific logic. We present the first review on fog computing within healthcare informatics, and explore, ...