-
381
A deep decentralized privacy-preservation framework for online social networks
Published 2024-12-01Get full text
Article -
382
Trust Model for Underwater Wireless Sensor Networks Based on Variational Autoencoders
Published 2025-04-01Get full text
Article -
383
Enhancing IDS for the IoMT based on advanced features selection and deep learning methods to increase the model trustworthiness.
Published 2025-01-01“…Finally, a deep neural network (DNN) classifies traffic as normal or anomalous. …”
Get full text
Article -
384
Wireless Body Area Networks for Healthcare Applications: Protocol Stack Review
Published 2015-10-01Get full text
Article -
385
Intrusion detection in software defined network using deep learning approaches
Published 2024-11-01Get full text
Article -
386
Network Intrusion Detection Using Knapsack Optimization, Mutual Information Gain, and Machine Learning
Published 2024-01-01Get full text
Article -
387
Detecting malicious code variants using convolutional neural network (CNN) with transfer learning
Published 2025-04-01“…We further improve the detection process by employing transfer learning to automatically identify and classify malware images based on their distinctive features. Empirical results demonstrate that MVDS achieves 97.98% accuracy with high detection speed, highlighting its potential for practical implementation in strengthening network security.…”
Get full text
Article -
388
Green IoT: how wireless sensor networks are paving the way for sustainable smart environments
Published 2023-06-01Get full text
Article -
389
PoseAlign network for hybrid structure in 2D human pose estimation
Published 2025-05-01Get full text
Article -
390
Anonymous Authentication Scheme Based on Physically Unclonable Function and Biometrics for Smart Cities
Published 2025-01-01“…In addition, the informal security analysis shows that it supports salient functional and security features such as mutual authentication, key agreement, perfect key secrecy, anonymity, and untraceability. …”
Get full text
Article -
391
Facial Expression Recognition using Convolutional Neural Networks with Transfer Learning Resnet-50
Published 2024-08-01Get full text
Article -
392
FEXGBIDS: Federated XGBoost-Based Intrusion Detection System for In-Vehicle Network
Published 2025-01-01“…By integrating the Federated Learning (FL) framework with cryptographic optimization techniques, FEXGBIDS addresses data silo and security challenges in the vehicular network environment. …”
Get full text
Article -
393
Logitwise Distillation Network: Improving Knowledge Distillation via Introducing Sample Confidence
Published 2025-02-01Get full text
Article -
394
-
395
-
396
Adversarial Hierarchical-Aware Edge Attention Learning Method for Network Intrusion Detection
Published 2025-07-01“…The rapid development of information technology has made cyberspace security an increasingly critical issue. Network intrusion detection methods are practical approaches to protecting network systems from cyber attacks. …”
Get full text
Article -
397
A Chaotic Maps-Based Authentication Scheme for Wireless Body Area Networks
Published 2016-07-01“…Compared with the previous schemes, our scheme not only enjoys more security features but also has reduced computational cost of client and application provider. …”
Get full text
Article -
398
DSNI-Net: Forensic Network for Detecting Splicing in Salt-and-Pepper Noisy Images
Published 2025-01-01Get full text
Article -
399
Application of the Genetic Algorithm in the Network Intrusion Detection System Using NSL-KDD Data
Published 2013-07-01“…With the development of the Internet, technological innovation and the availability of information emerged new computer security threats. The researchers are developing new systems known as Intrusion Detection Systems IDSs for detecting the known and unknown attacks. …”
Get full text
Article -
400
Lightweight machine learning framework for efficient DDoS attack detection in IoT networks
Published 2025-07-01“…Abstract The rapid proliferation of Internet of Things (IoT) devices has introduced significant security challenges, with Distributed Denial of Service (DDoS) attacks posing a critical threat to network integrity. …”
Get full text
Article