Showing 301 - 320 results of 836 for search '(( Computer networks Security features. ) OR ( Computer network Security features. ))*', query time: 0.27s Refine Results
  1. 301
  2. 302

    Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat, Bernardi Pranggono

    Published 2025-07-01
    “…In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. …”
    Get full text
    Article
  3. 303
  4. 304

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The proposed classification model demonstrates high flexibility and scalability, making it applicable to a wide range of network architectures for various computer vision tasks. …”
    Get full text
    Article
  5. 305
  6. 306
  7. 307
  8. 308

    Spatial correlation guided cross scale feature fusion for age and gender estimation by Shiyi Jiang, Qing Ji, Hukui Shi, Che Chen, Yang Xu

    Published 2025-07-01
    “…Abstract To address the challenges of age and gender recognition in uncontrolled scenarios with facial absence or severe occlusion, this paper proposes a Spatial Correlation Guided Cross Scale Feature Fusion Network (SCGNet). The proposed method specifically tackles the limitations of existing approaches that heavily rely on facial features, which become unreliable under partial/complete occlusion scenarios. …”
    Get full text
    Article
  9. 309
  10. 310
  11. 311
  12. 312
  13. 313
  14. 314

    Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation by V. V. S. H. Prasad, Swathi Sowmya Bavirthi, C. S. S. Anupama, E. Laxmi Lydia, K. Sathesh Kumar, Khalid Ammar, Mohamad Khairi Ishak

    Published 2025-07-01
    “…The IoT devices are said to be resource-constrained with computing resources and restricted memory. As a developing technology, BC holds the possibility of resolving security problems in IoT. …”
    Get full text
    Article
  15. 315

    Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system by Kevin Max, Larissa Sames, Shimeng Ye, Jan Steinkühler, Federico Corradi

    Published 2025-01-01
    “…We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
    Get full text
    Article
  16. 316
  17. 317
  18. 318

    Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond by Anas Alashqar, Ehsan Olyaei Torshizi, Raed Mesleh, Werner Henkel

    Published 2025-01-01
    “…Physical-layer secret key generation (PSKG) has emerged as a promising technique for enhancing wireless security in Internet of Things (IoT) networks by exploiting the reciprocity of uplink and downlink channels. …”
    Get full text
    Article
  19. 319
  20. 320