-
401
Explainability of Network Intrusion Detection Using Transformers: A Packet-Level Approach
Published 2025-01-01“…Network Intrusion Detection Systems (NIDS) are critical in ensuring the security of connected computer systems by actively detecting and preventing unauthorized activities and malicious attacks. …”
Get full text
Article -
402
Retrieving Encrypted Images Using Convolution Neural Network and Fully Homomorphic Encryption
Published 2023-02-01Get full text
Article -
403
-
404
Smart Grid Intrusion Detection for IEC 60870-5-104 With Feature Optimization, Privacy Protection, and Honeypot-Firewall Integration
Published 2025-01-01“…The experimental results demonstrate the framework’s operational capability and effectiveness for SCADA network security, achieving 99.29% accuracy, 94.8% recall and 4.1% false positive rates.…”
Get full text
Article -
405
VSA-GCNN: Attention Guided Graph Neural Networks for Brain Tumor Segmentation and Classification
Published 2025-01-01Get full text
Article -
406
Design and Implementation of FTTP Using Gigabit Passive Optical Network Architecture in Ghana
Published 2025-01-01Get full text
Article -
407
Medical image segmentation network based on multi-scale cross-attention and wavelet transform
Published 2025-07-01Get full text
Article -
408
A novel reconstruction-based video anomaly detection with idempotent generative network
Published 2025-06-01“…Finite Scalar Quantization (FSQ) layer is designed to discretize the encoder’s output, preserving key discriminative features. Meanwhile, the Pyramid Deformation Module (PDM), as an integral part of PSVAE, computes offset maps of original video frames for anomaly detection supplementation. …”
Get full text
Article -
409
Protecting IOT Networks Through AI-Based Solutions and Fractional Tchebichef Moments
Published 2025-06-01Get full text
Article -
410
ENHANCED POLSAR IMAGE CLASSIFICATION USING DEEP CONVOLUTIONAL AND TEMPORAL CONVOLUTIONAL NETWORKS
Published 2024-06-01Get full text
Article -
411
Anomaly-Based Intrusion Detection System in Wireless Sensor Networks Using Machine Learning Algorithms
Published 2024-01-01Get full text
Article -
412
Knowledge Graph Representation Learning Model Based on Capsule Network and Information Fusion
Published 2025-06-01Get full text
Article -
413
Detecting eavesdropping nodes in the power Internet of Things based on Kolmogorov-Arnold networks.
Published 2025-01-01“…The rapid proliferation of the Power Internet of Things (PIoT) has given rise to severe network security threats, with eavesdropping attacks emerging as a paramount concern. …”
Get full text
Article -
414
Generative Adversarial and Transformer Network Synergy for Robust Intrusion Detection in IoT Environments
Published 2025-06-01Get full text
Article -
415
Adaptive resource optimization mechanism for blockchain sharding in digital twin edge network
Published 2023-03-01“…To address the security and privacy issues for data sharing in digital twin edge networks, a new distributed and secure data sharing mechanism was developed by leveraging blockchain sharding.Considering dynamic and time varying features in digital twin edge networks and mapping errors of physic networks, an adaptive resource allocation model was formulated which jointly optimized cluster head selection, local base station (BS) consensus access selection, spectrum and computation consensus resources allocation, in order to maximize transactional throughput for the blockchain sharding.Moreover, a digital twin edge networks empowered two-layered proximal policy optimization (PPO) algorithm was designed to obtain the optimal solutions.Numerical results illustrate that the proposed algorithm can effectively improve the transactional throughput for the blockchain sharding.Meanwhile, it can well adapt to the mapping errors.…”
Get full text
Article -
416
A Survey of Quality-of-Service and Quality-of-Experience Provisioning in Information-Centric Networks
Published 2025-04-01Get full text
Article -
417
Group Authentication Key Agreement Protocol Based on Certificateless Cryptography in UAV Network
Published 2025-01-01“…If directly applied to multi-party interaction scenarios, traditional two-party key negotiation protocols require numerous interaction rounds, resulting in significant computational and communication overhead. Therefore, group key agreement protocols for UAV networks must provide a lighter computing process and stronger security guarantees.Methods This protocol adopts a certificateless key system. …”
Get full text
Article -
418
ATBShellFinder: A Bytecode-Level Webshell Detector Based on Adversarial Training
Published 2025-01-01Get full text
Article -
419
AUTOMATED ANALYSIS OF BREAKERS
Published 2014-12-01“…The main features of AISV are:· to provide the security and data base accuracy;· to carry out systematic control of breakers conformity with operating conditions;· to make the estimation of individual reliability’s value and characteristics of its changing for given combination of characteristics variety;· to provide personnel, who is responsible for technical maintenance of breakers, not only with information but also with methodological support, including recommendations for the given problem solving and advanced methods for its realization.…”
Get full text
Article -
420
A Dual-band Planar Antenna for Wireless Local Area Network Applications
Published 2019-12-01Get full text
Article