-
221
Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism
Published 2025-03-01“…In this work, we explored the design space of learning with error-based PQC schemes to design a lightweight key-encapsulation mechanism (KEM) suitable for resourceconstrained devices. …”
Get full text
Article -
222
Evaluating the Performance of LoRa Networks: A Study on Disaster Monitoring Scenarios
Published 2025-02-01“…These numerous technologies, such as LoRa (Long Range) transceivers, find applications in various domains, including monitoring natural disasters and those caused by human error. Security vulnerabilities arise concurrently with the advancement of these new technologies. …”
Get full text
Article -
223
Analyzing anomalous events in passageways with high-frequency ship signals.
Published 2025-01-01“…This means that disruptions such as natural disasters or human error at these crucial points can significantly impact numerous economies across various facets of trade. …”
Get full text
Article -
224
Transfer Reinforcement Learning-Based Power Control for Anti-Jamming in Underwater Acoustic Communication Networks
Published 2025-04-01“…However, they are highly susceptible to performance degradation due to narrow bandwidths, long propagation delays, and severe multipath effects, especially adversarial jamming attacks. Traditional anti-jamming techniques struggle to adapt to the dynamic nature of underwater acoustic channels effectively. …”
Get full text
Article -
225
Enhancing Communication Security in Drones Using QRNG in Frequency Hopping Spread Spectrum
Published 2024-11-01“…Our method introduces a concurrent access protocol for multiple drones to share a QRNG device efficiently, incorporating robust error handling and a shared memory system for random number distribution. …”
Get full text
Article -
226
Ultra-secure quantum protection for e-healthcare images: Hybrid chaotic one-time pad with cipher chaining encryption framework
Published 2025-08-01“…This study effectively bridges the gap between theoretical quantum security models and real-world implementation on existing NISQ devices, demonstrating resilience against classical statistical and differential attacks, as well as quantum-specific threats such as Grover’s brute-force search and quantum chosen-plaintext attacks. …”
Get full text
Article -
227
Design of an Iterative Method for Malware Detection Using Autoencoders and Hybrid Machine Learning Models
Published 2024-01-01“…This configuration allows the model to be able to detect and adapt to evolving attack patterns, thus, by 25%, significantly improving the zero-day attack detection.…”
Get full text
Article -
228
Lateral Phishing With Large Language Models: A Large Organization Comparative Study
Published 2025-01-01“…These errors can be mitigated by LLMs, potentially lowering the barrier for attackers. …”
Get full text
Article -
229
Biometric-Based Key Generation and User Authentication Using Voice Password Images and Neural Fuzzy Extractor
Published 2025-01-01“…The results show that the proposed neural fuzzy extractor model provides an equal error probability level of EER = 2.1%.…”
Get full text
Article -
230
Image Robust Watermarking Method Based on DWT-SVD Transform and Chaotic Map
Published 2024-01-01“…Robustness testing against various types of attacks resulted in normalized correlation (NC) values consistently surpassing 0.9, with bit error rate (BER) values approaching 0. …”
Get full text
Article -
231
Building a Cybersecurity Culture in Higher Education: Proposing a Cybersecurity Awareness Paradigm
Published 2025-04-01“…Research has shown that a significant percentage of recorded cyber incidents are attributed to social engineering practices or human error. In response to this growing threat, reinforcing cybersecurity awareness among users has become an urgent strategy to develop and apply. …”
Get full text
Article -
232
Codes in Dihedral Group Algebra
Published 2018-04-01“…So, the new classes of error-correcting codes are required for building new resistant code cryptosystems. …”
Get full text
Article -
233
High Security Differential Chaos-Based Modulation With Channel Scrambling for WDM-Aided VLC System
Published 2016-01-01“…However, due to the broadcasting property of optical channels, VLC systems may also suffer from malicious attacks or eavesdropping. In this paper, we present a differential chaos-based modulation with channel scrambling (DCM-CS) for wavelength-division multiplexing (WDM) aided VLC system to enhance the transmission security over red, green, and blue (RGB) channels. …”
Get full text
Article -
234
Cancelable biometric authentication leveraging empirical mode decomposition and quaternion representations for IoT security
Published 2025-03-01“…Experimental assessments indicate the method robustness against possible attacks, attaining an Area under the Receiver Operating Characteristic curve (AROC) of 0.9997 and an almost negligible Equal Error Rate (EER). …”
Get full text
Article -
235
GNSS-denied geolocalization of UAVs using terrain-weighted constraint optimization
Published 2024-12-01“…However, GNSS systems are susceptible to blockages, jamming, and spoofing attacks. Localization using onboard cameras and satellite images provides a promising solution for UAVs operating in GNSS-denied environments. …”
Get full text
Article -
236
Discrete-Modulated Coherent-State Quantum Key Distribution with Basis-Encoding
Published 2025-01-01“…However, the traditional DMCS-CVQKD scheme cannot tolerate the high channel excess noise and channel loss, compared to the Gaussian-modulated scheme, and its error correction is still difficult. In this paper, we propose a discrete-modulated coherent-state basis-encoding quantum key distribution (DMCS-BE-QKD) protocol, where the secret keys are encoded in the random choice of 2 measurement bases, i.e., the conjugate quadratures X and P of discrete-modulated coherent states, and it only needs simple binary sequence error correction. …”
Get full text
Article -
237
Rectifying Adversarial Examples Using Their Vulnerabilities
Published 2025-01-01“…Deep neural network-based classifiers are prone to errors when processing adversarial examples (AEs). …”
Get full text
Article -
238
Voice Fence Wall: User-optional voice privacy transmission
Published 2024-03-01“…Specifically, our framework achieves 89.84 % accuracy in sentiment recognition and 6.01 % equal error rate in voice authentication.…”
Get full text
Article -
239
DICTION: DynamIC robusT whIte bOx Watermarking Scheme for Deep Neural Networks
Published 2025-07-01“…Experiments conducted on four benchmark models (MLP, CNN, ResNet-18, and LeNet) demonstrate that DICTION achieves a zero bit error rate (BER) while maintaining model accuracy within 0.5% of the baseline. …”
Get full text
Article -
240
Adaptive Autoencoder-Based Intrusion Detection System with Single Threshold for CAN Networks
Published 2025-07-01“…The proposed autoencoder model was trained exclusively on normal data. A portion of the attack data was utilized to determine the optimal detection threshold using a Gaussian kernel density estimation function, while the frame count was selected based on error rate analysis. …”
Get full text
Article