-
261
Doppler Delay-Time Frequency Cross-Domain Joint High Security Transmission Scheme Based on Orthogonal Time Frequency Space
Published 2023-01-01“…It is shown that OTFS system with cyclic prefix (CP) of 1/16 obtains 2.1 dB gain than the OTFS system with CP of 1/32 in terms of receiver sensitivity when the bit error rate (BER) is 10<sup>-3</sup>. Due to its comprehensive advantages in error rate and security performance, this chaotic encryption based on OTFS has a high application prospect in low-cost and reliable optical access system.…”
Get full text
Article -
262
QLAW: An Improved Quantization-Based Local Audio Watermarking Scheme Using Inter-Frame Correlation
Published 2025-01-01“…Experimental results show that the proposed scheme outperforms existing schemes in inaudibility and robustness, achieving an average Signal-to-Noise Ratio (SNR) above 25 dB and a lower Bit Error Rate (BER) under various attacks.…”
Get full text
Article -
263
Trust Domain Extensions Guest Fuzzing Framework for Security Vulnerability Detection
Published 2025-06-01“…We show how our framework reveals undiscovered vulnerabilities in device initialization procedures, hypercall error-handling, and random number seeding logic using a QEMU/KVM-based TDX emulator and a TDX-enabled Linux kernel. …”
Get full text
Article -
264
Improving Voice Spoofing Detection Through Extensive Analysis of Multicepstral Feature Reduction
Published 2025-08-01“…Empirical evaluation using the ASVSpoof 2017 v2.0 dataset measures the classification performance with the Equal Error Rate (EER) metric, achieving values of approximately 10%. …”
Get full text
Article -
265
Quantum proof biometric authentication framework using binary lattices and homomorphic encryption for secure cancelable templates
Published 2025-06-01“…The AEGIIS scheme was designed to operate on the Ring-Learning-with-Errors hardness problem, which exhibits the super polynomial complexity of $$\ {O(n \log n)}$$ O ( n log n ) and is resilient to both classical and quantum attacks and tested using indistinguishability analysis through IND-CPA analysis on ROM model, achieving post-quantum security with a key size of 256 bits.…”
Get full text
Article -
266
Cancelable Multi-Branch Deep Learning Framework for Privacy-Preserving ECG Biometric Authentication
Published 2025-01-01“…In addition, the model demonstrates robustness against spoofing and transformation-based attacks. These results confirm the practicality and scalability of our approach in secure, real-world biometric applications.…”
Get full text
Article -
267
An Interpretable Siamese Attention Res-CNN for Fingerprint Spoofing Detection
Published 2024-01-01“…Nonetheless, these systems are vulnerable to spoofing attacks from suspicious fingerprints, posing significant risks to privacy. …”
Get full text
Article -
268
Synergizing TabNet and SHAP for PM10 Forecasting: Insights From Makkah, Saudi Arabia
Published 2024-01-01“…TabNet outperformed other machine learning models, achieving a Mean Absolute Error (MAE) of 8.27 and coefficient of determination (R2) of 0.872 on the training set, while attaining an MAE of 9.05 and an R2 of 0.805 on the testing set. …”
Get full text
Article -
269
IELTSoC: enhanced image encryption using combined logistic and Tinkerbell maps with second order cellular automata for internet of things
Published 2025-07-01“…The security analyses verify that the proposed method effectively diminishes the correlation between neighboring pixels in encrypted images and provides a substantial key space, hence increasing the difficulty for attackers to decrypt the images. The proposed scheme achieved an improvement of 10.87% in “Mean Squared Error" (MSE) over the existing techniques. …”
Get full text
Article -
270
Real Time Fractional Robust Adaptive Scheme for Frequency Regulation in Double Area Hybrid Power System With Renewables
Published 2025-01-01“…To validate the superiority of the proposed controller, five challenging scenarios have been considered, encompassing load fluctuations, integration of renewable energy sources, changes in system parameters and time delay attacks. The proposed controller effectively minimizes area control error achieving stability and showing cost function enhancement of 15% to 152% compared to other tested controllers in all scenarios. …”
Get full text
Article -
271
Introducing a novel 3D Chen-Rössler map for NTRU-based image encryption with OFDM transmission over a noisy channel
Published 2025-07-01“…Integrated with an FFT-OFDM transmission system, it clearly outperforms the DCT-OFDM variant in terms of noise robustness and bit error rate reduction, paving the way for secure, high-performance communications.…”
Get full text
Article -
272
Invulnerability invariants for software controlled speculation
Published 2024-12-01“…The idea with SCS is to allow a mode in the microarchitecture, where instructions that read from memory are not allowed to execute speculatively. Errors or malicious fault‐injections in the implementation of SCS can still render the microarchitecture vulnerable to Spectre attacks. …”
Get full text
Article -
273
Deception mechanisms of FDA‒AWACS against passive monopulse angle measurements
Published 2024-11-01“…Abstract Airborne warning and control systems (AWACS) serve as critical command and control centres in air combat operations, making them prime targets for strategic attacks. These enemy attacks typically rely on the accurate determination of AWACS combat positions using different direction‐finding devices. …”
Get full text
Article -
274
Improving resilience of energy nexus across demand sectors: Strengthening cybersecurity in water cycle and energy networks through data reconstruction using a novel hybrid reinforc...
Published 2025-09-01“…Implementing the proposed correction method reduces the mean absolute percentage error (MAPE) to 2.3884 % for thermal demands and 5.0803 % for water demands, showcasing its efficacy in stabilizing the demand chain. …”
Get full text
Article -
275
A Hybrid STL-Deep Learning Framework for Behavioral-Based Intrusion Detection in IoT Environments
Published 2025-06-01“…It attained an overall accuracy of 98.5% and a macro F1-score of 98.49%, while significantly reducing the overall false negative rate to 5.2% (FNR ≈ 0.24) and the overall false positive rate to 0.276% (FPR ≈ 0.11) across five Attack/Normal classes. These results represent a substantial improvement over standalone deep learning models (standalone LSTM FNR = 0.302, FPR = 0.185) and compare favorably to state-of-the-art benchmarks reported in the literature, particularly in minimizing critical detection errors. …”
Get full text
Article -
276
Active RIS-NOMA Uplink in URLLC, Jamming Mitigation via Surrogate and Deep Learning
Published 2025-01-01“…This work explores an active RIS-assisted NOMA uplink system aimed at mitigating jamming attacks while ensuring the reliability and latency requirements of ultra-reliable low-latency communication (URLLC) applications. …”
Get full text
Article -
277
A secure and imperceptible communication system for sharing co-ordinate data
Published 2025-07-01“…Furthermore, the system maintained low transmission overhead (under 300 KB for 100 co-ordinates) and demonstrated resilience against passive attacks and advanced attackers targeting data leaks. …”
Get full text
Article -
278
A Pre-Selection–Enhanced Arbiter PUF for Strengthening PUF-Based Authentication
Published 2025-01-01“…Additionally, bit aliasing reaches near-excellent levels, whereas Bit Error Rate (BER) remains below 0.2 or 0.3 for most boards. …”
Get full text
Article -
279
Effect of PIFR-based optimised inhalation therapy in patients recovering from acute exacerbation of chronic obstructive pulmonary disease: protocol of a prospective, multicentre, s...
Published 2020-05-01“…Correct inhalation therapy is effective in preventing AE attacks. However, inappropriate usage of dry powder inhaler, partially due to the unrecovered peak inhalation flow rate (PIFR) after acute exacerbation of COPD (AECOPD), results in increased risk of early treatment failure. …”
Get full text
Article -
280
Cooperative Intelligent Transport Systems: The Impact of C-V2X Communication Technologies on Road Safety and Traffic Efficiency
Published 2025-03-01“…The integration of artificial intelligence, sensors, and machine vision systems enables autonomous vehicles (AVs) to rapidly adapt to changes in the road environment, minimizing human error and significantly reducing collision risks. …”
Get full text
Article