Showing 301 - 320 results of 836 for search 'Computer network Security features.', query time: 0.12s Refine Results
  1. 301

    Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat, Bernardi Pranggono

    Published 2025-07-01
    “…In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. …”
    Get full text
    Article
  2. 302
  3. 303

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The proposed classification model demonstrates high flexibility and scalability, making it applicable to a wide range of network architectures for various computer vision tasks. …”
    Get full text
    Article
  4. 304
  5. 305
  6. 306

    Spatial correlation guided cross scale feature fusion for age and gender estimation by Shiyi Jiang, Qing Ji, Hukui Shi, Che Chen, Yang Xu

    Published 2025-07-01
    “…Abstract To address the challenges of age and gender recognition in uncontrolled scenarios with facial absence or severe occlusion, this paper proposes a Spatial Correlation Guided Cross Scale Feature Fusion Network (SCGNet). The proposed method specifically tackles the limitations of existing approaches that heavily rely on facial features, which become unreliable under partial/complete occlusion scenarios. …”
    Get full text
    Article
  7. 307
  8. 308
  9. 309
  10. 310
  11. 311
  12. 312
  13. 313
  14. 314

    Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation by V. V. S. H. Prasad, Swathi Sowmya Bavirthi, C. S. S. Anupama, E. Laxmi Lydia, K. Sathesh Kumar, Khalid Ammar, Mohamad Khairi Ishak

    Published 2025-07-01
    “…The IoT devices are said to be resource-constrained with computing resources and restricted memory. As a developing technology, BC holds the possibility of resolving security problems in IoT. …”
    Get full text
    Article
  15. 315
  16. 316
  17. 317

    Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond by Anas Alashqar, Ehsan Olyaei Torshizi, Raed Mesleh, Werner Henkel

    Published 2025-01-01
    “…Physical-layer secret key generation (PSKG) has emerged as a promising technique for enhancing wireless security in Internet of Things (IoT) networks by exploiting the reciprocity of uplink and downlink channels. …”
    Get full text
    Article
  18. 318

    Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system by Kevin Max, Larissa Sames, Shimeng Ye, Jan Steinkühler, Federico Corradi

    Published 2025-01-01
    “…We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
    Get full text
    Article
  19. 319
  20. 320

    MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION by Pratik Kumar Swain, Suneeta Satpathy, Srinivasa Rao Pokuri

    Published 2025-03-01
    “…Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to present a novel approach for MITM threat identification. …”
    Get full text
    Article