-
301
FPGA Implementations for Data Encryption and Decryption via Concurrent and Parallel Computation: A Review
Published 2021-03-01“…Data security, integrity, and verification may be used due to these features. …”
Get full text
Article -
302
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
Published 2025-07-01“…In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. …”
Get full text
Article -
303
-
304
Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain
Published 2024-01-01“…The proposed classification model demonstrates high flexibility and scalability, making it applicable to a wide range of network architectures for various computer vision tasks. …”
Get full text
Article -
305
Horizontal and Vertical Part-Wise Feature Extraction for Cross-View Gait Recognition
Published 2024-01-01Get full text
Article -
306
-
307
ST-CFI: Swin Transformer with convolutional feature interactions for identifying plant diseases
Published 2025-07-01Get full text
Article -
308
Spatial correlation guided cross scale feature fusion for age and gender estimation
Published 2025-07-01“…Abstract To address the challenges of age and gender recognition in uncontrolled scenarios with facial absence or severe occlusion, this paper proposes a Spatial Correlation Guided Cross Scale Feature Fusion Network (SCGNet). The proposed method specifically tackles the limitations of existing approaches that heavily rely on facial features, which become unreliable under partial/complete occlusion scenarios. …”
Get full text
Article -
309
A Deep Learning Approach Based on Interpretable Feature Importance for Predicting Sports Results
Published 2025-03-01Get full text
Article -
310
-
311
-
312
-
313
-
314
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation
Published 2025-07-01“…The IoT devices are said to be resource-constrained with computing resources and restricted memory. As a developing technology, BC holds the possibility of resolving security problems in IoT. …”
Get full text
Article -
315
Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system
Published 2025-01-01“…We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
Get full text
Article -
316
-
317
Towards Ensemble Feature Selection for Lightweight Intrusion Detection in Resource-Constrained IoT Devices
Published 2024-10-01Get full text
Article -
318
Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond
Published 2025-01-01“…Physical-layer secret key generation (PSKG) has emerged as a promising technique for enhancing wireless security in Internet of Things (IoT) networks by exploiting the reciprocity of uplink and downlink channels. …”
Get full text
Article -
319
-
320
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01Get full text
Article