-
241
Security Improvement on Biometric Based Authentication Scheme for Wireless Sensor Networks Using Fuzzy Extraction
Published 2016-01-01“…Our analysis shows that Yoon and Kim's scheme has various security weaknesses such as a biometric recognition error, a user verification problem, lack of anonymity and perfect forward secrecy, session key exposure by the gateway node, vulnerability to denial of service attacks, and a revocation problem. …”
Get full text
Article -
242
Efficient multi‐key fully homomorphic encryption over prime cyclotomic rings with fewer relinearisations
Published 2021-11-01“…The error bound of the basic function components is re‐analysed over prime cyclotomic rings in the average case, which can be used in the error analysis of our scheme. …”
Get full text
Article -
243
Method based on contrastive learning for fine-grained unknown malicious traffic classification
Published 2022-10-01“…In order to protect against unknown threats and evasion attacks, a new method based on contrastive learning for fine-grained unknown malicious traffic classification was proposed.Specifically, based on variational auto-encoder (CVAE), it included two classification stages, and cross entropy and reconstruction errors were used for known and unknown traffic classification respectively.Different form other methods, contrastive learning was adopted in different classification stages, which significantly improved the classification performance of the few-shot and unknown (zero-shot) classes.Moreover, some techniques (e.g., re-training and re-sample) combined with contrastive learning further improved the classification performance of the few-shot classes and the generalization ability of model.Experimental results indicate that the proposed method has increased the macro recall of few-shot classes by 20.3% and the recall of unknown attacks by 9.1% respectively, and it also has protected against evasion attacks on partial classes to some extent.…”
Get full text
Article -
244
Deep Neural Network-Based Detection of Modulated Jamming in Free-Space Optical Systems: Theory and Performance Under Atmospheric Fading
Published 2025-01-01“…Free-space optical (FSO) communication systems, though advantageous in terms of bandwidth and security, are highly susceptible to deliberate jamming attacks, particularly under intensity modulation and direct detection (IM/DD) constraints. …”
Get full text
Article -
245
Cancelable Biometric Template Generation Using Random Feature Vector Transformations
Published 2024-01-01“…The recognition performance of the proposed scheme is evaluated for face and fingerprint modalities. Equal Error Rate (EER) of 1.5 is obtained for face and 1.7 is obtained for the fingerprint in the worst case.…”
Get full text
Article -
246
Hilbert Convex Similarity for Highly Secure Random Distribution of Patient Privacy Steganography
Published 2023-01-01“…In order to evaluate the performance of the proposed solution, three quality metrics: Peak signal to noise ratio (PSNR), Mean Square Error (MSE), percentage residual difference (PRD) and Structural Similarity Index measure (SSIM) were computed and compared on ten MRI images. …”
Get full text
Article -
247
A Novel Technique for Secure Data Cryptosystem Based on Chaotic Key Image Generation
Published 2022-08-01“…So, one of the main challenges is to keep these information safe against attacks. Many researchers and institutions realized the importance and benefits of cryptography in achieving the efficiency and effectiveness of various aspects of secure communication.This work adopts a novel technique for secure data cryptosystem based on chaos theory. …”
Get full text
Article -
248
Experimental Implementation of Enhanced Security Coherent One-Way Quantum Key Distribution
Published 2025-01-01“…We also emphasize that monitoring the click rates of the data line detector for each state individually serves as a powerful method for detecting zero-error attacks.…”
Get full text
Article -
249
OPERATIONAL RISK MANAGEMENT GENERATED BY THE DIGITALIZATION OF THE BANKING SYSTEM
Published 2025-04-01“…Risks can come from various sources, such as internal errors and problems, external attacks, insufficient or inappropriate training of employees and many others. …”
Get full text
Article -
250
Application of a Hybrid Model Based on CEEMDAN and IMSA in Water Quality Prediction
Published 2025-06-01“…The predictions were combined and reconstructed, and a BiLSTM-based error correction model further corrected the errors, yielding the final prediction results. …”
Get full text
Article -
251
Multi-Channel Multi-Protocol Quantum Key Distribution System for Secure Image Transmission in Healthcare
Published 2025-01-01“…Quantum key distribution (QKD) is a viable technique for safeguarding image transmission against numerous attacks. To address the limitations of existing methods in securing electronic medical records, we have explored an encryption technique using a set of real-time medical images along with existing standard images using QKD protocols including BB84 (Bennett-Brassard 1984), CASCADE (Cascading Error Correction Algorithm for Data Exchange), and differential-phase-shift (DPS) under the fiber-based (OFC) and free-space (FSO) channels. …”
Get full text
Article -
252
A reversible and robust hybrid image steganography framework using radon transform and integer lifting wavelet transform
Published 2025-05-01“…The system exhibits exceptional robustness, with a Bit Error Rate (BER) as low as 0.0017 under scaling distortions, representing a 30% reduction compared to state-of-the-art methods. …”
Get full text
Article -
253
Generative Image Steganography via Encoding Pose Keypoints
Published 2024-12-01“…This method is robust against common image attacks, such as salt and pepper noise, median filtering, compression, and screenshots, with an average bit error rate of less than 0.87%. …”
Get full text
Article -
254
Phishing suspiciousness in older and younger adults: The role of executive functioning.
Published 2017-01-01“…Whether or not older adults reported being suspicious of the phishing attacks used in this study was partially explained by educational history and prior phishing knowledge. …”
Get full text
Article -
255
NSEA: A Resilient ERP Framework Integrating Quantum-Safe Cryptography and Neuro-Symbolic Reasoning for Industrial Adaptability
Published 2025-01-01“…On industrial IoT (IIoT) edge devices, Kyber-512 achieves sub-<inline-formula> <tex-math notation="LaTeX">$5~\mu $ </tex-math></inline-formula>s encryption latency and mitigates 72% of phishing attacks through dynamic response mechanisms. In demand forecasting tasks, the hybrid reasoning model reduced mean absolute percentage error (MAPE) to 6.8% and resolved 89% of inventory stockout alerts within 15 minutes. …”
Get full text
Article -
256
Sigma Delta Modulation Controller and Associated Cybersecurity Issues with Battery Energy Storage Integrated with PV-Based Microgrid
Published 2024-12-01“…Numerical results demonstrate the improved performance of the proposed SDM controller, with a 35% reduction in AC bus voltage error compared to the conventional PI controller and FLC. …”
Get full text
Article -
257
Image Encryption-Then-Transmission Using DNA Encryption Algorithm and The Double Chaos
Published 2018-01-01“…The simulation results verify that the cryptosystem is enough against the traditional attacks, such as statistical attack, differential attack, brute force attack, and entropy attack. …”
Get full text
Article -
258
CSI-based symmetric encryption end-to-end communication system
Published 2025-08-01“…Additionally, in four attack scenarios, such as brute force and key leakage attacks, the BER of eavesdropper is approximately 0.5, indicating an inability to decrypt the information. …”
Get full text
Article -
259
SMART DShot: Secure Machine-Learning-Based Adaptive Real-Time Timing Correction
Published 2025-08-01“…Our approach addresses critical vulnerabilities in Electronic Speed Controller (ESC) interfaces by deploying four synergistic algorithms—Kalman Filter Timing Correction (KFTC), Recursive Least Squares Timing Correction (RLSTC), Fuzzy Logic Timing Correction (FLTC), and Hybrid Adaptive Timing Correction (HATC)—each optimized for specific error characteristics and attack scenarios. Through comprehensive evaluation encompassing 32,000 Monte Carlo test iterations (500 per scenario × 16 scenarios × 4 algorithms) across 16 distinct operational scenarios and PolarFire SoC Field-Programmable Gate Array (FPGA) implementation, we demonstrate exceptional performance with 88.3% attack detection rate, only 2.3% false positive incidence, and substantial vulnerability mitigation reducing Common Vulnerability Scoring System (CVSS) severity from High (7.3) to Low (3.1). …”
Get full text
Article -
260
Formal Security Reassessment of the 5G-AKA-FS Protocol: Methodological Corrections and Augmented Verification Techniques
Published 2024-12-01“…The 5G-AKA protocol, a foundational component for 5G network authentication, has been found vulnerable to various security threats, including linkability attacks that compromise user privacy. To address these vulnerabilities, we previously proposed the 5G-AKA-Forward Secrecy (5G-AKA-FS) protocol, which introduces an ephemeral key pair within the home network (HN) to support forward secrecy and prevent linkability attacks. …”
Get full text
Article