-
301
Novel Federated Graph Contrastive Learning for IoMT Security: Protecting Data Poisoning and Inference Attacks
Published 2025-07-01“…In this paper, we propose FedGCL, a secure and efficient FL framework integrating contrastive graph representation learning for enhanced feature discrimination, a Jain-index-based fairness-aware aggregation mechanism, an adaptive synchronization scheduler to optimize communication rounds, and secure aggregation via homomorphic encryption within a Trusted Execution Environment. …”
Get full text
Article -
302
-
303
Secure internet of medical things based electronic health records scheme in trust decentralized loop federated learning consensus blockchain
Published 2024-01-01“…The proposed classification model demonstrates high flexibility and scalability, making it applicable to a wide range of network architectures for various computer vision tasks. …”
Get full text
Article -
304
-
305
Horizontal and Vertical Part-Wise Feature Extraction for Cross-View Gait Recognition
Published 2024-01-01Get full text
Article -
306
Spatial correlation guided cross scale feature fusion for age and gender estimation
Published 2025-07-01“…Abstract To address the challenges of age and gender recognition in uncontrolled scenarios with facial absence or severe occlusion, this paper proposes a Spatial Correlation Guided Cross Scale Feature Fusion Network (SCGNet). The proposed method specifically tackles the limitations of existing approaches that heavily rely on facial features, which become unreliable under partial/complete occlusion scenarios. …”
Get full text
Article -
307
A Deep Learning Approach Based on Interpretable Feature Importance for Predicting Sports Results
Published 2025-03-01Get full text
Article -
308
ST-CFI: Swin Transformer with convolutional feature interactions for identifying plant diseases
Published 2025-07-01Get full text
Article -
309
-
310
-
311
-
312
-
313
-
314
Blockchain enhanced distributed denial of service detection in IoT using deep learning and evolutionary computation
Published 2025-07-01“…The IoT devices are said to be resource-constrained with computing resources and restricted memory. As a developing technology, BC holds the possibility of resolving security problems in IoT. …”
Get full text
Article -
315
AccFIT-IDS: accuracy-based feature inclusion technique for intrusion detection system
Published 2025-12-01Get full text
Article -
316
-
317
Secret Key Generation Driven by Attention-Based Convolutional Autoencoder and Quantile Quantization for IoT Security in 5G and Beyond
Published 2025-01-01“…Physical-layer secret key generation (PSKG) has emerged as a promising technique for enhancing wireless security in Internet of Things (IoT) networks by exploiting the reciprocity of uplink and downlink channels. …”
Get full text
Article -
318
Synthetic biology meets neuromorphic computing: towards a bio-inspired olfactory perception system
Published 2025-01-01“…We propose a hybrid system of synthetic sensory neurons that provides three key features: (a) receptor-gated ion channels, (b) interface between synthetic biology and semiconductors and (c) event-based encoding and computing based on spiking networks. …”
Get full text
Article -
319
-
320
MACHINE LEARNING BASED STRATEGY FOR MITM ATTACK MITIGATION UTILIZING HYBRID FEATURE SELECTION
Published 2025-03-01“…Effective detection techniques are necessary due to the considerable threat posed by Man-in-the-Middle (MITM) attacks to network security. This study integrates machine learning classification, dimensionality reduction, and hybrid feature selection to present a novel approach for MITM threat identification. …”
Get full text
Article