Showing 721 - 740 results of 836 for search 'Computer network Security features.', query time: 0.11s Refine Results
  1. 721
  2. 722

    Lightweight UAV Detection Method Based on IASL-YOLO by Huaiyu Yang, Bo Liang, Song Feng, Ji Jiang, Ao Fang, Chunyun Li

    Published 2025-04-01
    “…First, we design the CFE-AFPN network to streamline the architecture while boosting feature fusion capabilities across non-adjacent layers. …”
    Get full text
    Article
  3. 723
  4. 724
  5. 725
  6. 726
  7. 727
  8. 728
  9. 729
  10. 730
  11. 731
  12. 732

    Accelerating Deep Learning-Based Morphological Biometric Recognition with Field-Programmable Gate Arrays by Nourhan Zayed, Nahed Tawfik, Mervat M. A. Mahmoud, Ahmed Fawzy, Young-Im Cho, Mohamed S. Abdallah

    Published 2025-01-01
    “…Convolutional neural networks (CNNs) are increasingly recognized as an important and potent artificial intelligence approach, widely employed in many computer vision applications, such as facial recognition. …”
    Get full text
    Article
  13. 733
  14. 734
  15. 735
  16. 736
  17. 737
  18. 738

    A Novel Framework for Financial Cybersecurity and Fraud Detection Using XAI-RNN-SGRU by Smarajit Ghosh

    Published 2025-01-01
    “…Cyber threats involve unauthorized access, alteration, or deletion of private information, extortion, and disruption of business operations. Traditional network security methods need more scalability, data protection, and difficulty detecting advanced threats. …”
    Get full text
    Article
  19. 739

    UAP: A System Authentication Protocol for UAV Relay Communication by UAV-Assisted by Chunpeng Liu, Tao Huang, Maode Ma

    Published 2025-01-01
    “…Furthermore, we evaluate the resilience of UAP against multiple security vulnerabilities using the Scyther tool. Finally, we compare our protocol with existing authentication methods in terms of application scenarios, security features, and both computational and communication overhead. …”
    Get full text
    Article
  20. 740

    Blockchain covert communication scheme based on the cover of normal transactions by Pengkun JIANG, Wenyin ZHANG, Jiuru WANG, Shanyun HUANG, Wanshui SONG

    Published 2022-08-01
    “…With the development of computer technology, the situation of modern network attack and defense is becoming increasingly severe, and the problem of secure transmission of secret information needs to be solved urgently.Covert communication technology embeds secret information into the carrier and transmits the information safely through the covert channel.However, the traditional covert channels face the challenges of data damaging, attack, detection and so on, which cannot meet the higher security requirements.As a public data platform, blockchain can embed secret information under the cover of a large number of transactions.With its tamper proof, anonymity, decentralization and other characteristics, blockchain can well solve the problems of traditional covert channels and achieve secure covert communication.However, the existing blockchain covert communication schemes are limited by low communication efficiency and poor security.How to improve safety and efficiency of covert communication is a research focus of blockchain covert communication.Motivated by this issue, a blockchain covert communication scheme based on the cover of normal transactions was proposed.The hash algorithm was used to build a transmission-free password table to embed secret information without changing any transaction data.Using the elliptic curve feature, transactions with hidden information can be quickly screened out from a large number of transactions, to extract secret information quickly.This scheme improves the security and efficiency of covert communication and has strong portability.Theoretical analysis shows that attackers cannot distinguish between ordinary transactions and special transactions.This scheme has high anti-detection and scalability.Besides, the experimental results of the bitcoin test network show the high efficiency of this scheme.…”
    Get full text
    Article