-
161
-
162
Dynamic Group Key Exchange Protocol With Lattice Trapdoor and Re-Encryption Mechanisms
Published 2025-01-01“…Specifically, our approach utilizes lattice trapdoors and a re-encryption mechanism based on the Ring Learning With Errors (RLWE) problem. This design not only achieves post-quantum security but also enhances efficiency and flexibility in dynamic group settings. …”
Get full text
Article -
163
A Trajectory Prediction Method for Reentry Glide Vehicles via Adaptive Cost Function
Published 2025-01-01“…This paper proposes a trajectory prediction method via the adaptive cost function to address the difficulties in inferring the attack intention and maneuver mode, as well as the accumulation of prediction error during the trajectory prediction of reentry glide vehicles. …”
Get full text
Article -
164
Combined compression and encryption of linear wireless sensor network data using autoencoders
Published 2025-05-01“…The proposed lossy compression has a mean square reconstruction error of less than 0.5 for compression ratios in the range of 5 to 10. …”
Get full text
Article -
165
A quantum-resilient lattice-based security framework for internet of medical things in healthcare systems
Published 2025-07-01Get full text
Article -
166
A comparative study of ultra-massive MIMO intelligent receivers with adversarial robustness and energy efficiency for 6G applications
Published 2025-06-01“…The approach integrates advanced technologies including UM-MIMO, cognitive radio, and Artificial Intelligence (AI)-based detection to enhance robustness against adversarial attacks. Simulation results demonstrate that the optimized Minimum Mean Square Error (MMSE) detector achieves up to 95 % reduction in Bit Error Rate (BER) compared to Zero-Forcing (ZF) in small-to-medium UM-MIMO configurations (2 × 2 to 32 × 32), as shown in Tables (4 and 5), while maintaining computational feasibility. …”
Get full text
Article -
167
Ethernet Passive Mutual Authentication Scheme on Quantum Networks
Published 2025-01-01“…The proposed scheme leverages the security of the ring learning with errors (RLWE) problem to establish a robust public-key cryptosystem. …”
Get full text
Article -
168
Research on the Improvement of the Signal Time Delay Estimation Method of Acoustic Positioning for Anti-Low Altitude UAVs
Published 2025-04-01“…With the popularity of low-altitude small unmanned aerial vehicles (UAVs), UAVs are often used to take candid photos or even carry out malicious attacks. Acoustic detection can be used to locate UAVs in order to prevent malicious attacks by UAVs. …”
Get full text
Article -
169
Improve security of wireless sensor networks through reluctant checksum
Published 2017-09-01“…But an adversary can still recover the secrets by eavesdropping the frames and performing off-line brute-force attacks. Capturing valid frames is fundamental for such attacks. …”
Get full text
Article -
170
Quantum dialogue protocol based on self-dual quantum low density parity check codes
Published 2020-08-01“…In quantum channels,particles are usually affected by noise during transmission.A quantum dialogue protocol based on self-dual quantum low density parity check codes was proposed to resist noise attacks.A combination of B construction method and U construction method was used to construct a self-dual quantum low density parity check matrix.The proposed quantum dialogue protocol can resist common external attacks,and there was no information leakage,which improved the efficiency of encoding and decoding.The security of quantum dialogue protocol was studied from the perspective of error correction.Security analysis shows that the protocol has sufficient security and can effectively resist common malicious attacks.…”
Get full text
Article -
171
Facial Anti-Spoofing Using “Clue Maps”
Published 2024-11-01“…In addition, the inter-dataset on CASIA-MFSD (training set) and Replay-attack (Testing set) reaches a new state-of-the-art performance with 23.8% Half Total Error Rate (HTER).…”
Get full text
Article -
172
Model and training method for aerial image object detector with optimization of both robustness and computational efficiency
Published 2024-10-01“…However, the vulnerability of neural networks to noise, adversarial attacks, and weight error injections significantly diminishes their robustness and overall effectiveness. …”
Get full text
Article -
173
A deep learning based intrusion detection system for CAN vehicle based on combination of triple attention mechanism and GGO algorithm
Published 2025-06-01“…For checking the effectiveness of the suggested method, an open-source dataset was applied, which recorded the traffic of CAN using a real vehicle throughout injection attacks of message. The results show that this method outperforms certain machine learning algorithms in error rate and false negative for DoS and drive gear and RPM spoofing attack with accuracy of 96.3%, recall of 96.1%, F1-Score of 96.2%, specificity of 97.2%, accuracy of 96.3%, AUC-ROC of 0.97, and MCC of 0.92 for DoS attacks. …”
Get full text
Article -
174
Enhancing Voice Spoofing Detection: A Hybrid Approach With VGGish-LSTM Model for Improved Security in Automatic Speaker Verification Systems
Published 2025-01-01“…Cybercrimes frequently manifest through the utilization of the internet. Spoofing attacks epitomize an advanced facet of contemporary cybercrime. …”
Get full text
Article -
175
A Secure Asymmetric Optical Image Encryption Based on Phase Truncation and Singular Value Decomposition in Linear Canonical Transform Domain
Published 2021-01-01“…The efficacy of the system is calculated by evaluating the estimated error between the input and retrieved images. The proposed technique provides innumerable security keys and is robust against various potential attacks. …”
Get full text
Article -
176
Rotation Correction Algorithm Based on Polar Harmonic Fourier Moments and Optimization of Color Image Security Quantization Watermarking Scheme
Published 2024-01-01“…In comparison, the mean square error of the proposed rotation angle estimation model rose from 0.042 to 0.018, and the mean absolute error climbed from 0.065 to 0.032. …”
Get full text
Article -
177
Enhancing the reliability and accuracy of wireless sensor networks using a deep learning and blockchain approach with DV-HOP algorithm for DDoS mitigation and node localization
Published 2025-06-01“…Abstract Wireless sensor networks (WSNs) are subject to distributed denial-of-service (DDoS) attacks that impact data dependability, mobility of nodes, and energy drain. …”
Get full text
Article -
178
Optimal Joint Defense and Monitoring for Networks Security under Uncertainty: A POMDP-Based Approach
Published 2024-01-01“…The POMDP model accounts for uncertainty in monitoring and defense processes, as well as the probabilistic attack propagation. This paper develops two security policies based on the optimal stationary defense policy for the underlying POMDP state process (i.e., a network with known compromises): the estimation-based policy that performs the defense actions corresponding to the optimal minimum mean square error state estimation and the distribution-based policy that utilizes the posterior distribution of network compromises to make defense decisions. …”
Get full text
Article -
179
Early prediction of ransomware API calls behaviour based on GRU-TCN in healthcare IoT
Published 2023-12-01“…Consequently, ransomware attacks to encrypt healthcare systems or leak such data have increased recently. …”
Get full text
Article -
180
Metrics for code obfuscation based on symbolic execution and N-scope complexity
Published 2022-12-01“…Code obfuscation has been well developed as mitigated endogenous security technology, to effectively resist MATE attacks (e.g.reverse engineering).And it also has important value for the reasonable metrics of code obfuscation effect.Since symbolic execution is widely used in anti-obfuscation attacks, metrics for code obfuscation resilience can refer to the efforts of generating input test set for executing all program paths.However, some adversarial techniques could reduce the symbol execution efficiency significantly based on the nested structure of the program and increase the error of the resilience reference.To solve the above problems, a metrics for code obfuscation was proposed based on symbolic execution and N-scope complexity.The obfuscation resilience was defined with symbolic execution time and obfuscation potency was defined based on the proposed N-scope complexity for better robustness in measuring the resilience of multi-nested structure programs.Furthermore, the correlation analysis of obfuscation effect was proposed and the effect was quantified by symbolic execution and control flow diagram extraction of programs.Over 4000 obfuscated programs from 3 open-sourced assemblies were evaluated with proposed metrics in the experiment, which indicated the generalization performance and practicality of the metrics.And an example of this metrics application was presented in a simulated obfuscation scenario which provided references of obfuscation technology metrics and obfuscation configuration for obfuscation users.…”
Get full text
Article