Search alternatives:
networks » network (Expand Search)
Showing 301 - 320 results of 836 for search 'Computer networks Security features.', query time: 0.13s Refine Results
  1. 301
  2. 302

    Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks by Amarudin Daulay, Kalamullah Ramli, Ruki Harwahyu, Taufik Hidayat, Bernardi Pranggono

    Published 2025-07-01
    “…In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. …”
    Get full text
    Article
  3. 303
  4. 304
  5. 305

    Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain by Megha Kuliha, Sunita Verma

    Published 2024-01-01
    “…The proposed classification model demonstrates high flexibility and scalability, making it applicable to a wide range of network architectures for various computer vision tasks. …”
    Get full text
    Article
  6. 306
  7. 307
  8. 308
  9. 309

    Spatial correlation guided cross scale feature fusion for age and gender estimation by Shiyi Jiang, Qing Ji, Hukui Shi, Che Chen, Yang Xu

    Published 2025-07-01
    “…This research provides new insights for robust identity analysis in human-computer interaction and intelligent security applications.…”
    Get full text
    Article
  10. 310
  11. 311
  12. 312
  13. 313
  14. 314
  15. 315
  16. 316
  17. 317

    Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system by Kevin Max, Larissa Sames, Shimeng Ye, Jan Steinkühler, Federico Corradi

    Published 2025-01-01
    “…We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
    Get full text
    Article
  18. 318

    Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond by Anas Alashqar, Ehsan Olyaei Torshizi, Raed Mesleh, Werner Henkel

    Published 2025-01-01
    “…Physical-layer secret key generation (PSKG) has emerged as a promising technique for enhancing wireless security in Internet of Things (IoT) networks by exploiting the reciprocity of uplink and downlink channels. …”
    Get full text
    Article
  19. 319

    Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation by V. V. S. H. Prasad, Swathi Sowmya Bavirthi, C. S. S. Anupama, E. Laxmi Lydia, K. Sathesh Kumar, Khalid Ammar, Mohamad Khairi Ishak

    Published 2025-07-01
    “…The IoT devices are said to be resource-constrained with computing resources and restricted memory. As a developing technology, BC holds the possibility of resolving security problems in IoT. …”
    Get full text
    Article
  20. 320