-
741
-
742
-
743
Dual-Model Synergy for Fingerprint Spoof Detection Using VGG16 and ResNet50
Published 2025-02-01Get full text
Article -
744
-
745
Application of Blockchain and Internet of Things in Healthcare and Medical Sector: Applications, Challenges, and Future Perspectives
Published 2021-01-01“…Few major reasons for using the Blockchain in healthcare systems are its prominent features, i.e., Decentralization, Immutability, Security and Privacy, and Transparency. …”
Get full text
Article -
746
-
747
-
748
-
749
Hybrid deep learning model for accurate and efficient android malware detection using DBN-GRU.
Published 2025-01-01“…The model extracts static features (permissions, API calls, intent filters) and dynamic features (system calls, network activity, inter-process communication) from Android APKs, enabling a comprehensive analysis of application behavior.The proposed model was trained and tested on the Drebin dataset, which includes 129,013 applications (5,560 malware and 123,453 benign).Performance evaluation against NMLA-AMDCEF, MalVulDroid, and LinRegDroid demonstrated that DBN-GRU achieved 98.7% accuracy, 98.5% precision, 98.9% recall, and an AUC of 0.99, outperforming conventional models.In addition, it exhibits faster preprocessing, feature extraction, and malware classification times, making it suitable for real-time deployment.By bridging static and dynamic detection methodologies, the DBN-GRU enhances malware detection capabilities while reducing false positives and computational overhead.These findings confirm the applicability of the proposed model in real-world Android security applications, offering a scalable and high-performance malware detection solution.…”
Get full text
Article -
750
-
751
Blockchain-Based Value-Added Tax System: A Systematic Review
Published 2024-06-01Get full text
Article -
752
Sylph: An Unsupervised APT Detection System Based on the Provenance Graph
Published 2025-07-01Get full text
Article -
753
-
754
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01Get full text
Article -
755
VdaBSC: A Novel Vulnerability Detection Approach for Blockchain Smart Contract by Dynamic Analysis
Published 2023-01-01Get full text
Article -
756
-
757
Hybrid Deep Learning Framework for Continuous User Authentication Based on Smartphone Sensors
Published 2025-04-01“…This research proposes a hybrid deep learning framework that combines techniques from computer vision and sequence modeling, namely, ViT-inspired patch extraction, multi-head attention, and BiLSTM networks, to authenticate users continuously from smartphone sensor data. …”
Get full text
Article -
758
SwinTCS: A Swin Transformer Approach to Compressive Sensing with Non-Local Denoising
Published 2025-04-01Get full text
Article -
759
Cancelable finger vein authentication using multidimensional scaling based on deep learning
Published 2025-06-01Get full text
Article -
760
Efficient Deep Learning-Based Cyber-Attack Detection for Internet of Medical Things Devices
Published 2023-12-01Get full text
Article