-
401
-
402
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
Published 2023-02-01Get full text
Article -
403
-
404
VSA-GCNN: Attention Guided Graph Neural Networks for Brain Tumor Segmentation and Classification
Published 2025-01-01Get full text
Article -
405
Design and Implementation of FTTP Using Gigabit Passive Optical Network Architecture in Ghana
Published 2025-01-01Get full text
Article -
406
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…The experimental results demonstrate the framework’s operational capability and effectiveness for SCADA network security, achieving 99.29% accuracy, 94.8% recall and 4.1% false positive rates.…”
Get full text
Article -
407
Medical image segmentation network based on multi-scale cross-attention and wavelet transform
Published 2025-07-01Get full text
Article -
408
A novel reconstruction-based video anomaly detection with idempotent generative network
Published 2025-06-01“…Finite Scalar Quantization (FSQ) layer is designed to discretize the encoder’s output, preserving key discriminative features. Meanwhile, the Pyramid Deformation Module (PDM), as an integral part of PSVAE, computes offset maps of original video frames for anomaly detection supplementation. …”
Get full text
Article -
409
-
410
Protecting IOT Networks Through AI-Based Solutions and Fractional Tchebichef Moments
Published 2025-06-01Get full text
Article -
411
ENHANCED POLSAR IMAGE CLASSIFICATION USING DEEP CONVOLUTIONAL AND TEMPORAL CONVOLUTIONAL NETWORKS
Published 2024-06-01Get full text
Article -
412
Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms
Published 2024-01-01Get full text
Article -
413
Knowledge Graph Representation Learning Model Based on Capsule Network and Information Fusion
Published 2025-06-01Get full text
Article -
414
Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks.
Published 2025-01-01“…The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. …”
Get full text
Article -
415
Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
Published 2025-06-01Get full text
Article -
416
Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network
Published 2023-03-01“…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
Get full text
Article -
417
A Survey of Quality-of-Service and Quality-of-Experience Provisioning in Information-Centric Networks
Published 2025-04-01Get full text
Article -
418
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
Published 2025-01-01“…If directly applied to multi-party interaction scenarios, traditional two-party key negotiation protocols require numerous interaction rounds, resulting in significant computational and communication overhead. Therefore, group key agreement protocols for UAV networks must provide a lighter computing process and stronger security guarantees.Methods This protocol adopts a certificateless key system. …”
Get full text
Article -
419
A Dual-band Planar Antenna for Wireless Local Area Network Applications
Published 2019-12-01Get full text
Article -
420
SoybeanNet: A Lightweight Neural Network for Soybean Pod Detection and Quantification
Published 2025-01-01“…Future work will focus on extending SoybeanNet to detect and quantify other critical crop features and integrating it with broader agricultural monitoring systems to support sustainable farming and food security.…”
Get full text
Article