-
361
-
362
Flash Attack Prognosis by Ensemble Supervised Learning for IoT Networks
Published 2023-03-01Get full text
Article -
363
Network-based intrusion detection using deep learning technique
Published 2025-07-01“…These findings underscore the effectiveness of deep learning architectures enhanced with optimized feature selection in detecting network intrusions, making the proposed system a promising solution for securing critical infrastructure in sectors such as finance, healthcare, and government networks.…”
Get full text
Article -
364
Towards edge-collaborative, lightweight and privacy-preserving classification framework
Published 2022-01-01“…Aiming at the problems of data leakage of perceptual image and computational inefficiency of privacy-preserving classification framework in edge-side computing environment, a lightweight and privacy-preserving classification framework (PPCF) was proposed to supports encryption feature extraction and classification, and achieve the goal of data transmission and computing security under the collaborative classification process of edge nodes.Firstly, a series of secure computing protocols were designed based on additive secret sharing.Furthermore, two non-collusive edge servers were used to perform secure convolution, secure batch normalization, secure activation, secure pooling and other deep neural network computing layers to realize PPCF.Theoretical and security analysis indicate that PPCF has excellent accuracy and proved to be security.Actual performance evaluation show that PPCF can achieve the same classification accuracy as plaintext environment.At the same time, compared with homomorphic encryption and multi-round iterative calculation schemes, PPCF has obvious advantages in terms of computational cost and communication overhead.…”
Get full text
Article -
365
Transformer-based tokenization for IoT traffic classification across diverse network environments
Published 2025-08-01Get full text
Article -
366
(IoT) Network intrusion detection system using optimization algorithms
Published 2025-07-01“…Compared with traditional models like the Long Short-Term Memory Recurrent Neural Network (LSTM-RNN) and Support Vector Machine (SVM), the proposed framework significantly improves the sensitivity and generalization ability for detecting various types of attacks through dynamic feature selection and parameter optimization. …”
Get full text
Article -
367
-
368
Advanced intrusion detection in internet of things using graph attention networks
Published 2025-03-01Get full text
Article -
369
A comprehensive review on the users’ identity privacy for 5G networks
Published 2022-03-01Get full text
Article -
370
-
371
-
372
-
373
Dynamic Hypergraph Convolutional Networks for Hand Motion Gesture Sequence Recognition
Published 2025-06-01Get full text
Article -
374
Anomaly detection in encrypted network traffic using self-supervised learning
Published 2025-07-01“…Abstract Privacy and security in network communication have been enhanced via encryption and traditional anomaly detection methods are no longer effective because of their payload inspection. …”
Get full text
Article -
375
RMFKAN: Network Spammers Detection Method Based on Improved Graph Mamba
Published 2025-05-01Get full text
Article -
376
An Open Conformance Test System towards the Standardization of Wireless Sensor Networks
Published 2012-11-01Get full text
Article -
377
Explainable AI for Lightweight Network Traffic Classification Using Depthwise Separable Convolutions
Published 2025-01-01“…With the rapid growth of internet usage and the increasing number of connected devices, there is a critical need for advanced Network Traffic Classification (NTC) solutions to ensure optimal performance and robust security. …”
Get full text
Article -
378
CGTS: graph transformer-based anomaly detection in controller area networks
Published 2025-08-01Get full text
Article -
379
Research on power data security full-link monitoring technology based on alternative evolutionary graph neural architecture search and multimodal data fusion
Published 2025-06-01“…The current evolutionary graph neural architecture search (GNAS) method mainly focuses on the topological connection and feature fusion between network layers, but it often requires a lot of computing resources, and the real-time performance of the GNN (graph neural network) model is difficult to meet the requirements when facing dynamic attacks and changing data. …”
Get full text
Article -
380
A deep decentralized privacy-preservation framework for online social networks
Published 2024-12-01Get full text
Article