-
401
NeuroRF FarmSense: IoT-fueled precision agriculture transformed for superior crop care
Published 2024-01-01Get full text
Article -
402
Lightweight machine learning framework for efficient DDoS attack detection in IoT networks
Published 2025-07-01“…Abstract The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges, with Distributed Denial of Service (DDoS) attacks posing a critical threat to network integrity. …”
Get full text
Article -
403
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
Get full text
Article -
404
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
Published 2023-02-01Get full text
Article -
405
VSA-GCNN: Attention Guided Graph Neural Networks for Brain Tumor Segmentation and Classification
Published 2025-01-01Get full text
Article -
406
Design and Implementation of FTTP Using Gigabit Passive Optical Network Architecture in Ghana
Published 2025-01-01Get full text
Article -
407
-
408
Medical image segmentation network based on multi-scale cross-attention and wavelet transform
Published 2025-07-01Get full text
Article -
409
-
410
A novel reconstruction-based video anomaly detection with idempotent generative network
Published 2025-06-01“…Finite Scalar Quantization (FSQ) layer is designed to discretize the encoder’s output, preserving key discriminative features. Meanwhile, the Pyramid Deformation Module (PDM), as an integral part of PSVAE, computes offset maps of original video frames for anomaly detection supplementation. …”
Get full text
Article -
411
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…The experimental results demonstrate the framework’s operational capability and effectiveness for SCADA network security, achieving 99.29% accuracy, 94.8% recall and 4.1% false positive rates.…”
Get full text
Article -
412
Protecting IOT Networks Through AI-Based Solutions and Fractional Tchebichef Moments
Published 2025-06-01Get full text
Article -
413
ENHANCED POLSAR IMAGE CLASSIFICATION USING DEEP CONVOLUTIONAL AND TEMPORAL CONVOLUTIONAL NETWORKS
Published 2024-06-01Get full text
Article -
414
Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms
Published 2024-01-01Get full text
Article -
415
Knowledge Graph Representation Learning Model Based on Capsule Network and Information Fusion
Published 2025-06-01Get full text
Article -
416
-
417
Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks.
Published 2025-01-01“…The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. …”
Get full text
Article -
418
Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
Published 2025-06-01Get full text
Article -
419
Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network
Published 2023-03-01“…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
Get full text
Article -
420
A Survey of Quality-of-Service and Quality-of-Experience Provisioning in Information-Centric Networks
Published 2025-04-01Get full text
Article