-
161
Facial Feature Recognition with Multi-task Learning and Attention-based Enhancements
Published 2025-01-01Get full text
Article -
162
A lightweight verifiable outsourced decryption of attribute-based encryption scheme for blockchain-enabled wireless body area network in fog computing
Published 2020-02-01“…The proposal provides the verifiability of ciphertext that ensures the user to check the correctness efficiently. (2) The size of the ciphertext is constant that is not increased with the complexity of attribute and access structure. (3) For Internet of Things devices, it introduces the fog computing into our protocol for the purpose of low latency and relation interactions, which has virtually saved the bandwidth. (4) With the help of blockchain technique, we encapsulate the hash value of public parameter, original and transformed ciphertext and transformed key into a block, so that the tamper-resistance is facilitated against an adversary from inside and outside the system. (5) In the standard model, we prove that it is selectively chosen-plaintext attack-secure and verifiable provided that the computational bilinear Diffie–Hellman assumption holds. (6) It implements this protocol and shows the result of performance measurement, which indicates a significant reduction on communication and computation costs burden on every entity in wireless body area network.…”
Get full text
Article -
163
-
164
-
165
-
166
EfficientTransformer: A Dynamic Anomaly Detection Model for Industrial Control Networks
Published 2025-01-01“…As industrial control network threats become increasingly complex, traditional intrusion detection systems (IDS) struggle to capture implicit relationships due to feature redundancy and intricate feature interactions. …”
Get full text
Article -
167
Security Evaluation of Provably Secure ECC-Based Anonymous Authentication and Key Agreement Scheme for IoT
Published 2025-01-01Get full text
Article -
168
-
169
-
170
Controller Area Network (CAN) Bus Transceiver with Authentication Support and Enhanced Rail Converters
Published 2024-11-01Get full text
Article -
171
-
172
CAN-GraphiT: A Graph-Based IDS for CAN Networks Using Transformer
Published 2025-01-01Get full text
Article -
173
Ergodic secrecy rate and outage probability in NOMA IRS massive MIMO networks with jamming
Published 2025-07-01Get full text
Article -
174
-
175
Intrusion Detection Framework for Internet of Things with Rule Induction for Model Explanation
Published 2025-03-01Get full text
Article -
176
Intrusion detection system based on machine learning using least square support vector machine
Published 2025-04-01Get full text
Article -
177
-
178
YOLO-Ssboat: Super-Small Ship Detection Network for Large-Scale Aerial and Remote Sensing Scenes
Published 2025-06-01“…Additionally, it employs a high-resolution feature layer and incorporates a Multi-Scale Weighted Pyramid Network (MSWPN) to enhance feature diversity. …”
Get full text
Article -
179
-
180