-
121
Secure cloud computing: leveraging GNN and leader K-means for intrusion detection optimization
Published 2024-12-01“…Additionally, the study introduces an optimized Grasshopper Optimization algorithm, which enhances the performance of the Optimal Neural Network, further refining detection accuracy. …”
Get full text
Article -
122
Post-Quantum Cryptography Resilience in Telehealth Using Quantum Key Distribution
Published 2025-05-01“…Future studies should explore additional optimizations, homomorphic encryption, and larger-scale pilots under regulatory standards.…”
Get full text
Article -
123
Optimal path selection and secured data transmission in underwater acoustic sensor networks: LSTM-based energy prediction.
Published 2023-01-01“…Further, the data is transmitted via the optimal path securely by encrypting the data with the proposed improved blowfish algorithm (IBFA). …”
Get full text
Article -
124
Mitigating Transmission Errors: A Forward Error Correction-Based Framework for Enhancing Objective Video Quality
Published 2025-06-01“…This is achieved by combining H.264/AVC syntax-based encryption and decryption algorithms with error correction during the video coding process to provide end-to-end confidentiality. …”
Get full text
Article -
125
A hybrid PKI and spiking neural network approach for enhancing security and energy efficiency in IoMT-based healthcare 5.0
Published 2025-06-01“…Thus, a novel security framework is proposed in this work, in which a Public Key Infrastructure- Energy-Efficient Routing Protocol (PKI-EERP) with a Zebra Optimization Algorithm (ZOA) is incorporated in spiking neural networks. …”
Get full text
Article -
126
GuardianML: Anatomy of Privacy-Preserving Machine Learning Techniques and Frameworks
Published 2025-01-01“…GuardianML filters potential frameworks based on user-defined criteria, such as the number of parties involved in multi-party computation or the need to minimize communication costs in homomorphic encryption scenarios. The system’s recommendations and optimizations are formulated as a maximization problem using linear integer programming to identify the most suitable solution for various use cases. …”
Get full text
Article -
127
A cross-chain model for warehouse receipts in port supply chain based on notary mechanism and ShangMi cryptographic algorithms
Published 2025-04-01“…To further enhance operational efficiency, the system incorporates performance optimization strategies such as batch processing and incremental synchronization. …”
Get full text
Article -
128
Applicable Image Security Based on Computational Genetic Approach and Self-Adaptive Substitution
Published 2023-01-01“…The proposed encryption method depends mainly on four steps: sequence generation, diffusion, confusion, and optimization. …”
Get full text
Article -
129
A Framework for Generating S-Box Circuits with Boyer–Peralta Algorithm-Based Heuristics, and Its Applications to AES, SNOW3G, and Saturnin
Published 2024-12-01“…The gate count in the cipher and the circuit depth must be low to minimize these two metrics. Many optimization strategies have been developed for the linear layer, led by the Boyer–Peralta (BP) algorithm. …”
Get full text
Article -
130
Optimizing Energy Efficiency in Vehicular Edge-Cloud Networks Through Deep Reinforcement Learning-Based Computation Offloading
Published 2024-01-01“…Given the complexity of this problem in large-scale vehicular networks, the study formulates an equivalent reinforcement learning model and employs a deep learning algorithm to derive optimal solutions. Simulation results conclusively demonstrate that the proposed model significantly outperforms existing benchmark techniques in terms of energy savings.…”
Get full text
Article -
131
DNS over HTTPS Tunneling Detection System Based on Selected Features via Ant Colony Optimization
Published 2025-05-01“…Ant Colony Optimization (ACO) is integrated with machine learning algorithms such as XGBoost, K-Nearest Neighbors (KNN), Random Forest (RF), and Convolutional Neural Networks (CNNs) using CIRA-CIC-DoHBrw-2020 as the benchmark dataset. …”
Get full text
Article -
132
-
133
A Novel QR Code–Based Solution for Secure Electronic Health Record Transfer in Venous Thromboembolism Home Rehabilitation Management: Algorithm Development and Validation
Published 2025-08-01“…It uses BPE, Avro, and Gzip for optimized data compression and uses ChaCha20 and BLAKE3 for encryption and authentication. …”
Get full text
Article -
134
Verifiable secure image retrieval for cloud-assisted IoT environments
Published 2025-03-01“…A matrix-based approach was employed for indexing and querying, and the feature matrix was encrypted using an enhanced secure k-nearest neighbor (kNN) algorithm based on the learning with errors (LWE), ensuring improved security in indexing and querying. …”
Get full text
Article -
135
Deep Reinforcement Learning-Enabled Computation Offloading: A Novel Framework to Energy Optimization and Security-Aware in Vehicular Edge-Cloud Computing Networks
Published 2025-03-01“…Then a deep learning-based algorithm is designed to learn close-optimal offloading solutions under dynamic conditions. …”
Get full text
Article -
136
Pilot-Based Codebook Non-Orthogonal Artificial Noise Schemes for Physical Layer Security: Secrecy Capacity Optimization Under Unknown Eavesdropper Channels
Published 2024-01-01“…It uses the successive convex approximation algorithm to analyze the optimal power allocation strategy and the maximum number of eavesdropper antennas that the system can tolerate under these conditions. …”
Get full text
Article -
137
Enhancing Privacy in IoT Networks: A Comparative Analysis of Classification and Defense Methods
Published 2025-01-01“…As a defense mechanism, DP is applied using the Fourier Perturbation Algorithm (FPA) to optimize padding strategies while maintaining network efficiency. …”
Get full text
Article -
138
An Identity Management Scheme Based on Multi-Factor Authentication and Dynamic Trust Evaluation for Telemedicine
Published 2025-03-01“…By integrating ShangMi cryptographic algorithms and blockchain, it optimizes performance, achieving 35% lower communication overhead than previous protocols. …”
Get full text
Article -
139
-
140
Secure Quantum Communication With Multi-Users in Quantum Networks
Published 2025-01-01“…Quantum Key Distribution (QKD) and encryption protocols are central to secure user-to-user communication in quantum networks. …”
Get full text
Article