-
141
Secure bio-inspired optimization with intrusion aware on-demand routing in MANETs
Published 2025-07-01“…The proposed methodology is built upon the conventional AODV protocol which uses bio-inspired Elephant Herding Optimization algorithm. Here, Trust Value (TV) which is the important security measure is considered as the fundamental parameter of route selection. …”
Get full text
Article -
142
High-Performance Number Theoretic Transform on GPU Through radix2-CT and 4-Step Algorithms
Published 2025-01-01“…To this end, our algorithms leverage novel strategy to optimize memory access patterns adaptive to input size, which often is very large. …”
Get full text
Article -
143
Design Optimization of Parameters for Resolver Software Decoding Based on Surrogate Model Management
Published 2025-06-01“…Next, a surrogate model was constructed for the software decoding system, using the Latin hypercube design (LHD) method and based on a radial basis function. Finally, a genetic algorithm (GA) was utilized to optimize parameters in the resolver software decoding system through a solving process, and a partial encryption method was introduced to iteratively update the surrogate model, yielding a partially optimal solution that meets the error requirements. …”
Get full text
Article -
144
-
145
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization
Published 2024-12-01“…Additionally, the study introduces an optimized Grasshopper Optimization algorithm, which enhances the performance of the Optimal Neural Network, further refining detection accuracy. …”
Get full text
Article -
146
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Future studies should explore additional optimizations, homomorphic encryption, and larger-scale pilots under regulatory standards.…”
Get full text
Article -
147
Optimal path selection and secured data transmission in underwater acoustic sensor networks: LSTM-based energy prediction.
Published 2023-01-01“…Further, the data is transmitted via the optimal path securely by encrypting the data with the proposed improved blowfish algorithm (IBFA). …”
Get full text
Article -
148
Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality
Published 2025-06-01“…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
Get full text
Article -
149
A hybrid PKI and spiking neural network approach for enhancing security and energy efficiency in IoMT-based healthcare 5.0
Published 2025-06-01“…Thus, a novel security framework is proposed in this work, in which a Public Key Infrastructure- Energy-Efficient Routing Protocol (PKI-EERP) with a Zebra Optimization Algorithm (ZOA) is incorporated in spiking neural networks. …”
Get full text
Article -
150
GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks
Published 2025-01-01“…GuardianML filters potential frameworks based on user-defined criteria, such as the number of parties involved in multi-party computation or the need to minimize communication costs in homomorphic encryption scenarios. The system’s recommendations and optimizations are formulated as a maximization problem using linear integer programming to identify the most suitable solution for various use cases. …”
Get full text
Article -
151
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms
Published 2025-04-01“…To further enhance operational efficiency, the system incorporates performance optimization strategies such as batch processing and incremental synchronization. …”
Get full text
Article -
152
Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
Published 2023-01-01“…The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. …”
Get full text
Article -
153
A Framework for Generating S-Box Circuits with Boyer–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
Published 2024-12-01“…The gate count in the cipher and the circuit depth must be low to minimize these two metrics. Many optimization strategies have been developed for the linear layer, led by the Boyer–Peralta (BP) algorithm. …”
Get full text
Article -
154
Optimizing Energy Efficiency in Vehicular Edge-Cloud Networks Through Deep Reinforcement Learning-Based Computation Offloading
Published 2024-01-01“…Given the complexity of this problem in large-scale vehicular networks, the study formulates an equivalent reinforcement learning model and employs a deep learning algorithm to derive optimal solutions. Simulation results conclusively demonstrate that the proposed model significantly outperforms existing benchmark techniques in terms of energy savings.…”
Get full text
Article -
155
DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization
Published 2025-05-01“…Ant Colony Optimization (ACO) is integrated with machine learning algorithms such as XGBoost, K-Nearest Neighbors (KNN), Random Forest (RF), and Convolutional Neural Networks (CNNs) using CIRA-CIC-DoHBrw-2020 as the benchmark dataset. …”
Get full text
Article -
156
-
157
A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation
Published 2025-08-01“…It uses BPE, Avro, and Gzip for optimized data compression and uses ChaCha20 and BLAKE3 for encryption and authentication. …”
Get full text
Article -
158
Verifiable secure image retrieval for cloud-assisted IoT environments
Published 2025-03-01“…A matrix-based approach was employed for indexing and querying, and the feature matrix was encrypted using an enhanced secure k-nearest neighbor (kNN) algorithm based on the learning with errors (LWE), ensuring improved security in indexing and querying. …”
Get full text
Article -
159
Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks
Published 2025-03-01“…Then a deep learning-based algorithm is designed to learn close-optimal offloading solutions under dynamic conditions. …”
Get full text
Article -
160
Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels
Published 2024-01-01“…It uses the successive convex approximation algorithm to analyze the optimal power allocation strategy and the maximum number of eavesdropper antennas that the system can tolerate under these conditions. …”
Get full text
Article