-
181
Crypto-coding technique based on polar code and secret key generated from wireless channel characteristics for wireless communication systems.
Published 2025-01-01“…The key benefit is that it achieves the same bit error rate (BER) performance and computational complexity as traditional polar codes and existing methods despite only taking one step. …”
Get full text
Article -
182
Optimizing Security of Radio Frequency Identification Systems in Assistive Devices: A Novel Unidirectional Systolic Design for Dickson-Based Field Multiplier
Published 2025-02-01“…The method of implementing field multiplication operation significantly influences the system’s resilience against side-channel attacks; for instance, implementation using unidirectional systolic array structures can provide enhanced error detection capabilities, improving resistance to side-channel attacks compared to traditional bidirectional multipliers. …”
Get full text
Article -
183
Blindfolded Flight: A Novel Approach for Secure Drone Flight
Published 2025-01-01“…The system demonstrates no tendency for prediction error to increase over time during the 360-second flight, regardless of the presence of GPS spoofing attacks.…”
Get full text
Article -
184
Inter-team variability in game play under critical game scenarios: a study in high-level men’s volleyball using social network analysis (Variabilidad entre equipos en el juego baj...
Published 2022-01-01“…After one error in attack, most teams presented a game style characterized by strong attacks, although Russia played using exploration of the block. …”
Get full text
Article -
185
Deep learning-based encryption scheme for medical images using DCGAN and virtual planet domain
Published 2025-01-01“…The robustness against key sensitivity, noise, cropping attacks, and adversarial attacks are shown in Figs. 15–18, 22–23, and 24. …”
Get full text
Article -
186
A Novel Method for Screening the PMU Phase Angle Difference Data Based on Hyperplane Clustering
Published 2019-01-01“…Field data can suffer from errors, such as time synchronization error, transducer error, PMU algorithm error, hardware error or malicious attacks, etc. …”
Get full text
Article -
187
Robust zero-watermarking based on dual branch neural network for ownership authentication, auxiliary information delivery and tamper detection
Published 2025-06-01“…Experimental results demonstrate the robustness of the proposed method against geometric distortions, common signal processing attacks, and combined attacks, achieving bit error rates below 0.005 and normalized correlation values close to or equal to 1. …”
Get full text
Article -
188
U-Net-Based Fingerprint Enhancement for 3D Fingerprint Recognition
Published 2025-02-01“…By applying the proposed method, the fingerprint recognition Equal Error Rate (EER) in experiment A and B improved from 41.32% and 41.97% to 13.96 and 12.49%, respectively, over the public dataset.…”
Get full text
Article -
189
Enhancing accuracy through ensemble based machine learning for intrusion detection and privacy preservation over the network of smart cities
Published 2025-02-01“…Abstract The world is at peak of fifth-generation communication technology and adopting ideas like cloudification or virtualization, but, the most important element is still “security”, since more and more data is connected to the internet. Threat attacks are increasing in recent years, but classic network intrusion detection system has significant limitations that make it challenging to identify new attacks quickly. …”
Get full text
Article -
190
Steganography Scheme Based on Reed-Muller Code with Improving Payload and Ability to Retrieval of Destroyed Data for Digital Images
Published 2017-06-01“…The simulation results show that the proposed algorithm is also able to retrieve destroyed data by intentional or unintentional attacks such as addition of noise and filtering due to use of the error correction code. …”
Get full text
Article -
191
Reversible steganographic method based on interpolation by bivariate linear box-spline on the three directional mesh
Published 2020-09-01“…Secret data is hidden in the error between the cover and interpolated pixels. …”
Get full text
Article -
192
Semi-local Time sensitive Anonymization of Clinical Data
Published 2024-12-01“…The approach protects against linking- and distribution attacks by providing k-anonymity and t-closeness. …”
Get full text
Article -
193
An Extensive Analysis on Optimized 3D Watermarking Using Enhanced Clustering Techniques
Published 2024-01-01“…To test the robustness of the watermark, common attacks and geometric attacks are applied to the watermarked models. …”
Get full text
Article -
194
An improving secure communication using multipath malicious avoidance routing protocol for underwater sensor network
Published 2024-12-01“…The characteristics of UWSN with underwater channels make them vulnerable to malicious attacks. UWSN communication networks are particularly susceptible to malicious attacks owing to high bit error rates, significant propagation delay variations, and low bandwidth. …”
Get full text
Article -
195
A New Multistage Encryption Scheme Using Linear Feedback Register and Chaos-Based Quantum Map
Published 2022-01-01“…The threat landscape, the statistical test analysis, along critical comparisons with other schemes indicate that the presented algorithm is significantly secure and is resistant to a wide range of different attacks such as differential and statistical attacks. …”
Get full text
Article -
196
Resilient $${\mathcalligra {H}}_\infty$$ filter design for networked control systems under communication jamming cyberattacks
Published 2025-07-01“…Consequently, the discrete-time models of filtering error systems become time-dependent, thereby complicating the design of filters. …”
Get full text
Article -
197
Separable reversible data hiding by vacating room after encryption using encrypted pixel difference
Published 2025-04-01“…The encrypted image ensures high security against various attacks, including statistical, differential, and chosen plaintext attacks, and it allows for the extraction of secret data and recovery of the original image independently, making it a separable process.…”
Get full text
Article -
198
Video dual-domain watermarking algorithm based on hybrid DWT-DCT and frame grouping
Published 2025-02-01“…The algorithm is shown to be robust against distortion noise attacks and frame attacks of varying intensities. …”
Get full text
Article -
199
Lower-Complexity Multi-Layered Security Partitioning Algorithm Based on Chaos Mapping-DWT Transform for WA/SNs
Published 2025-03-01“…The resource limitations of Low-Power Wireless Networks (LP-WNs), such as Wireless Sensor Networks (WSNs), Wireless Actuator/Sensor Networks (WA/SNs), and Internet of Things (IoT) outdoor applications, restrict the utilization of the error-performance-enhancing techniques and the use of the powerful and robust security tools. …”
Get full text
Article -
200
Spoofing Evident and Spoofing Deterrent Localization Using Ultrawideband (UWB) Active–Passive Ranging
Published 2024-01-01“…Our experimental evaluation shows a 30-cm <inline-formula><tex-math notation="LaTeX">$\text {75}{\text{th}}$</tex-math></inline-formula> percentile error for ToF-based honest tag localization and a submeter error for TDoA-based localization for spoofing tags. …”
Get full text
Article