Sandi Rahmadika

Sandi Rahmadika
Universitas Negeri Padang | UNP

Doctor of Engineering
State University of Padang, Indonesia

About

25
Publications
3,081
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
216
Citations
Introduction
Security and the evaluation of blockchain technology, privacy-preserving on the blockchain, AI with blockchain integration, applied cryptography, and security evaluation of cryptographic algorithms.
Additional affiliations
September 2017 - present
Pukyong National University
Position
  • Researcher
Education
February 2015 - February 2016
Pukyong National University
Field of study
  • IT Convergence and Application Engineering
February 2014 - August 2016
Bandung Institute of Technology
Field of study
  • Electrical Engineering
September 2009 - August 2013
Universitas Bengkulu
Field of study
  • Electrical Engineering

Publications

Publications (25)
Article
This study aims to facilitate the provision of information and reduce the amount of paper use in the Department of Electronics Engineering, Faculty of Engineering, Padang State University. With the large amount of paper used to provide information on conventional e-mading, it causes too much paper to be wasted and not too effective in providing inf...
Article
The Internet of Medical Things (IoMT) has risen to prominence as a possible backbone in the health sector, with the ability to improve quality of life by broadening user experience while enabling crucial solutions such as near real-time remote diagnostics. However, privacy and security problems remain largely unresolved in the safety area. Various...
Article
Full-text available
A private decentralized e-health environment, empowered by blockchain technology, grants authorized healthcare entities to legitimately access the patient's medical data without relying on a centralized node. Every activity from authorized entities is recorded immutably in the blockchain transactions. In terms of privacy, the e-health system preser...
Article
Full-text available
Decentralized learning (DL) enables several devices to assemble deep learning models while keeping their private training data on the device. Rather than uploading the training data and model to the server, cross-silo DL only sends the local gradients gradually to the aggregation server back and forth. Hence, DL can provide privacy training of mach...
Article
Full-text available
Smart contracts (SCs) and collaborative learning (CL) are disclosed publicly, in which most transactions and activities that occur by the parties can be bared in real-time. Both are strengthened in a decentralized manner. CL allows numerous clients to collectively build deep learning models privately by aggregating the gradient values from clients’...
Article
Full-text available
The emergence of the Internet of Vehicles (IoV) aims to facilitate the next generation of intelligent transportation system (ITS) applications by combining smart vehicles and the internet to improve traffic safety and efficiency. On the other hand, mobile edge computing (MEC) technology provides enormous storage resources with powerful computing on...
Article
Full-text available
Edge networks (ENs) in 5G have the capability to protect traffic between edge entry points (edge-to-edge), enabling the design of various flexible and customizable applications. The advantage of edge networks is their pioneering integration of other prominent technologies such as blockchain and federated learning (FL) to produce better services on...
Chapter
Blockchain technology and decentralized learning are attracting growing attention. Most existing methods of machine learning is in the centralized form which relies upon the third party in terms of the raw datasets and mining resources. Blockchain solves world centralization problems that keep the system secure through complex mathematical computat...
Article
Federated learning (FL) permits a vast number of connected to construct deep learning models while keeping their private training data on the device. Rather than uploading the training data and model to the server, FL only sends the local gradients gradually. Hence, FL preserves data privacy by design. FL leverages a decentralized approach where th...
Article
Full-text available
Decentralized approaches are extensively researched by academia and industry in order to cover up the flaws of existing systems in terms of data privacy. Blockchain and decentralized learning are prominent representatives of a deconcentrated approach. Blockchain is secure by design since the data record is irrevocable, tamper-resistant, consensus-b...
Article
Full-text available
Propagation time on permissionless blockchain plays a significant role in terms of stability and performance in the decentralized systems. A large number of activities are disseminated to the whole nodes in the decentralized peer-to-peer network, thus causing propagation delay. The stability of the system is our concern in the first place. The prop...
Article
Medical record (MedRec) of the patient is derived from several healthcare providers i.e. hospital, the national provider, and laboratories which contains personally identifiable information test yet referred to therapeutic procedures and medications of the patient. MedRec has been compiled and maintained by several providers thus resulting in separ...
Conference Paper
In recent years, blockchain technology and federated learning are widely discussed. Both technologies are running on top of the decentralized form, which is a subset of the distributed system. Blockchain is well known as the leading edge technology that can safely and effectively remedy problems in centralized systems. There is no dependence on thi...
Article
Full-text available
The shared storage is essential in the decentralized system. A straightforward storage model with guaranteed privacy protection on the peer-to-peer network is a challenge in the blockchain technology. The decentralized storage system should provide the privacy for the parties since it contains numerous data that are sensitive and dangerous if misus...
Chapter
Personal Health Information (PHI) system is an activity of patient and healthcare providers in order to organize, manage, and integrate the data which refers to medical history and laboratory results. The data is obtained from several providers with different formats which result in separated data in the network without certain format standards. Th...
Article
Full-text available
The personal health information (PHI) is an activity among the health-care providers and the patients in terms of managing the data which is sensitive to the parties. The PHI data have been maintained by multiple health-care providers, thus resulting in separated data. Moreover, the PHI data are stored in the provider’s database, hence the patients...
Article
Full-text available
Blockchain turns both currencies and commodities into a digital form without relying on middleman which allows one person to trade with another include trading the renewable energy. Blockchain technology as a secure and low-cost platform to track the billions of eventual transactions in a distributed energy economy has attracted the attention of ex...
Conference Paper
Data integrity is a fundamental component of information security and as a process, data integrity verifies the data has remained unaltered in transit from creation to reception. Container dwelling time data in the seaport is used in this research which provide detailed information about the length of time the presence of container in the seaport....

Questions

Network

Cited By