Showing 621 - 640 results of 836 for search 'computer network security features.', query time: 0.10s Refine Results
  1. 621
  2. 622
  3. 623

    Research on multi-user identity recognition based on Wi-Fi sensing by Zhongcheng WEI, Wei CHEN, Yanhu DONG, Bin LIAN, Wei WANG, Jijun ZHAO

    Published 2024-03-01
    “…With the advancement of wireless sensing technology, research on Wi-Fi-based identity recognition has garnered significant attention in fields such as human-computer interaction and home security.While identity recognition based on Wi-Fi signals has achieved initial success, it is currently primarily suitable for scenarios involving individual user behavior.Identity recognition for multiple users in concurrent behavior scenarios still faces a series of challenges, including issues related to mutual interference between users and poor model robustness.Therefore, a Wiblack system for recognizing multiple user identities in a concurrent distribution behavior scenario was proposed.The core idea was to train a multi-branch deep neural network (Wiblack-Net) to extract unique features for each individual user.Firstly, the common features among multiple users were extracted using the backbone network.Then, a binary classifier was assigned to each user to determine the presence of the target user within a given group, thereby achieving identity recognition for multiple users based on concurrent behavior.In addition, experiments comparing Wiblack with several independent binary classification models and a single multiclassification model were conducted to analyze operational efficiency.System performance experimental results demonstrate that when simultaneously identifying the identities of three users, Wibalck achieves an average accuracy of 92.97%, an average precision of 93.71%, an average recall of 93.24%, and an average F1 score of 92.43%.…”
    Get full text
    Article
  4. 624
  5. 625

    Deep Learning-Based Image Watermarking Using Catalan Transform and Non-Negative Matrix Factorization by Md. Fahim Hossain Saikat, Md. Al-Mamun Provath, Kaushik Deb, Pranab Kumar Dhar, Tetsuya Shimamura

    Published 2025-01-01
    “…The main contribution of the proposed method is its new combination of the Catalan transform (CT) and non-negative matrix factorization (NMF) with an artificial neural network (ANN) for enhanced watermark embedding and extraction. …”
    Get full text
    Article
  6. 626

    Integration of OWL Password-Authenticated Key Exchange Protocol to Enhance IoT Application Protocols by Yair Rivera Julio, Angel Pinto Mangones, Juan Torres Tovio, María Clara Gómez-Álvarez, Dixon Salcedo

    Published 2025-04-01
    “…Its one-round exchange model and resistance to both passive and active attacks make it particularly well-suited for constrained devices and dynamic network topologies. The originality of the proposal lies in embedding OWL directly into protocols like CoAP, enabling secure session establishment as a native feature rather than as an auxiliary security layer. …”
    Get full text
    Article
  7. 627
  8. 628
  9. 629
  10. 630
  11. 631
  12. 632
  13. 633
  14. 634
  15. 635
  16. 636
  17. 637
  18. 638
  19. 639
  20. 640