-
261
Transfer learning for securing electric vehicle charging infrastructure from cyber-physical attacks
Published 2025-03-01Get full text
Article -
262
Design of an iterative method for disease prediction in finger millet leaves using graph networks, dyna networks, autoencoders, and recurrent neural networks
Published 2024-12-01“…This work proposes a comprehensive framework for detection and prediction of the disease in Finger Millet leaves using a combination of Graph Networks, Dyna Networks, Autoencoders, and Recurrent Neural Networks. …”
Get full text
Article -
263
A secure and efficient deep learning-based intrusion detection framework for the internet of vehicles
Published 2025-04-01“…Vision Transformer (ViT), wavelet transforms, and GAT ensure effective feature extraction, and a novel hybrid optimization known as Crayfish-Mother secure Optimization (CMSO) method is proposed to optimize feature selection to its maximum and reduce computational cost. …”
Get full text
Article -
264
An intelligent attention based deep convoluted learning (IADCL) model for smart healthcare security
Published 2025-01-01Get full text
Article -
265
Securing IoT-Cloud Applications with AQ-KGMO-DMG Enhanced SVM for Intrusion Detection
Published 2025-02-01“…Intrusion detection, as a cornerstone of information security, plays a pivotal role in fortifying networks against potential threats, emphasizing the necessity for robust and reliable methods capable of discerning and mitigating network vulnerabilities effectively. …”
Get full text
Article -
266
Deep Complex Gated Recurrent Networks-Based IoT Network Intrusion Detection Systems
Published 2024-09-01“…Convolutional neural networks (CNN) are used for spatial feature extraction and superfluous data are filtered to improve computing efficiency. …”
Get full text
Article -
267
Improvement of the Regulatory Framework of Information Security for Terminal Access Devices of the State Information System
Published 2020-04-01“…Such diversity and heterogeneity of state information systems, on the one hand, and the need for high-quality state regulation in the field of information security in these systems, on the other hand, require the study and development of legal acts that take into account primarily the features of systems that have a typical modern architecture of “thin customer". …”
Get full text
Article -
268
-
269
Security-Enhanced Lightweight Authentication Key-Agreement Protocol for Unmanned Aerial Vehicle Communication
Published 2025-04-01“…Unmanned aerial vehicles have been widely employed in recent years owing to their remarkable features such as low environmental requirements and high survivability, and a new tendency towards networking, intelligence, and collaboration has emerged. …”
Get full text
Article -
270
Lightweight terminal cross-domain authentication protocol in edge computing environment
Published 2023-08-01“…Edge computing has gained widespread usage in intelligent applications due to its benefits, including low latency, high bandwidth, and cost-effectiveness.However, it also faces many security challenges due to its distributed, real-time, multi-source and heterogeneous data characteristics.Identity authentication serves as the initial step for terminal to access to the network and acts as the first line of defense for edge computing.To address the security issues in the edge computing environment, a terminal cross-domain authentication protocol suitable for the edge computing environment was proposed based on the "cloud-edge-end" three-level network authentication architecture.Access authentication was implemented between terminals and local edge nodes based on the SM9 algorithm, and session keys were negotiated.The secret key was combined with symmetric encryption technology and hash function to achieve cross-domain authentication for the terminal.The pseudonym mechanism was used in the authentication process to protect the privacy of end users.The terminal only needs to register once, and it can roam randomly between different security domains.BAN logic was used to prove the correctness of the protocol and analyze its security.The results show that this protocol is capable of resisting common attacks in IoT scenarios, and it features characteristics such as single sign-on and user anonymity.The performance of the cross-domain authentication protocol was evaluated based on computational and communication costs, and compared with existing schemes.The experimental results show that this protocol outperforms other schemes in terms of computational and communication costs, making it suitable for resource-constrained terminal devices.Overall, the proposed protocol offers lightweight and secure identity authentication within edge computing environments.…”
Get full text
Article -
271
Edge computing privacy protection method based on blockchain and federated learning
Published 2021-11-01“…Aiming at the needs of edge computing for data privacy, the correctness of calculation results and the auditability of data processing, a privacy protection method for edge computing based on blockchain and federated learning was proposed, which can realize collaborative training with multiple devices at the edge of the network without a trusted environment and special hardware facilities.The blockchain was used to endow the edge computing with features such as tamper-proof and resistance to single-point-of-failure attacks, and the gradient verification and incentive mechanism were incorporated into the consensus protocol to encourage more local devices to honestly contribute computing power and data to the federated learning.For the potential privacy leakage problems caused by sharing model parameters, an adaptive differential privacy mechanism was designed to protect parameter privacy while reducing the impact of noise on the model accuracy, and moments accountant was used to accurately track the privacy loss during the training process.Experimental results show that the proposed method can resist 30% of poisoning attacks, and can achieve privacy protection with high model accuracy, and is suitable for edge computing scenarios that require high level of security and accuracy.…”
Get full text
Article -
272
Hybrid Deep Learning Techniques for Improved Anomaly Detection in IoT Environments
Published 2024-12-01Get full text
Article -
273
DynBlock: dynamic data encryption with Toffoli gate for IoT
Published 2025-05-01“…We evaluate DynBlock with both 3 and 5 rounds to assess its security and computational efficiency. While the 5-round configuration offers stronger resistance to cryptanalytic attacks, the 3-round setup already delivers robust security, featuring high entropy and a strong avalanche effect, making it well-suited for resource-constrained environments. …”
Get full text
Article -
274
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
275
Overview of detection techniques for malicious social bots
Published 2017-11-01“…The attackers use social bots to steal people’s privacy,propagate fraud messages and influent public opinions,which has brought a great threat for personal privacy security,social public security and even the security of the nation.The attackers are also introducing new techniques to carry out anti-detection.The detection of malicious social bots has become one of the most important problems in the research of online social network security and it is also a difficult problem.Firstly,development and application of social bots was reviewed and then a formulation description for the problem of detecting malicious social bots was made.Besides,main challenges in the detection of malicious social bots were analyzed.As for how to choose features for the detection,the development of choosing features that from static user features to dynamic propagation features and to relationship and evolution features were classified.As for choosing which method,approaches from the previous research based on features,machine learning,graph and crowd sourcing were summarized.Also,the limitation of these methods in detection accuracy,computation cost and so on was dissected.At last,a framework based on parallelizing machine learning methods to detect malicious social bots was proposed.…”
Get full text
Article -
276
-
277
A Cloud User Anomaly Detection Method Based on Mouse Behavior
Published 2019-08-01Get full text
Article -
278
Design of an integrated model using deep reinforcement learning and Variational Autoencoders for enhanced quantum security
Published 2025-12-01“…Finally, it considers the optimization of cryptographic protocols in a distributed quantum network using Multi-Agent Deep Q-Networks. This multi-agent system strengthens both the security and computational efficiency by reducing attack vulnerabilities by 15–18 % and lowering the computational complexity by 20–25 %. …”
Get full text
Article -
279
A lightweight speaker verification approach for autonomous vehicles
Published 2024-12-01Get full text
Article -
280
A High-Performance and Lightweight Maritime Target Detection Algorithm
Published 2025-03-01Get full text
Article