Review of the metaheuristic algorithms in applications: Visual analysis based on bibliometrics (1994–2023)
G Li, T Zhang, CY Tsai, L Yao, Y Lu, J Tang - Expert Systems with …, 2024 - Elsevier
Metaheuristic algorithms have gradually become the mainstream way to solve complex
optimization problems with their streamlined structure and robust performance. Innovative …
optimization problems with their streamlined structure and robust performance. Innovative …
A Systematic Review on Intrusion Detection System in Wireless Networks: Variants, Attacks, and Applications
The significance of wireless networks is expanding very rapidly, and their increasing
pervasiveness makes them a vital component of the activities involved in living in the …
pervasiveness makes them a vital component of the activities involved in living in the …
Fast and Lightweight Image Cryptosystem for IoMT Applications
This paper presents a fast and lightweight image encryption technique founded on a new
concept of progressive and selective diffusion. We make use of modified chaotic systems …
concept of progressive and selective diffusion. We make use of modified chaotic systems …
Systematic survey on visually meaningful image encryption techniques
Due to advancements in technology, digital images are widely used in various applications
like medical field, military communication, remote sensing, etc. These images may contain …
like medical field, military communication, remote sensing, etc. These images may contain …
Chaotic image encryption algorithm with improved bonobo optimizer and DNA coding for enhanced security
Image encryption involves applying cryptographic approaches to convert the content of an
image into an illegible or encrypted format, reassuring that illegal users cannot simply …
image into an illegible or encrypted format, reassuring that illegal users cannot simply …
Reconfigurable logic and in-sensor encryption operations in an asymmetrically tunable van der Waals heterostructure
F Gong, W Deng, Y Wu, F Liu, Y Guo, Z Che, J Li, J Li… - Nano Research, 2024 - Springer
Reconfigurable devices can be used to achieve multiple logic operation and intelligent
optical sensing with low power consumption, which is promising candidates for new …
optical sensing with low power consumption, which is promising candidates for new …
Cryptographic methods for secured communication in SDN‐based VANETs: A performance analysis
Vehicular ad‐hoc networks (VANETs) support features like comfort, safety, and infotainment,
enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large …
enhancing traffic efficiency. However, traditional VANETs struggle with dynamic and large …
Efficient colour image encryption algorithm using a new fractional-order memcapacitive hyperchaotic system
In comparison with integer-order chaotic systems, fractional-order chaotic systems exhibit
more complex dynamics. In recent years, research into fractional chaotic systems for the …
more complex dynamics. In recent years, research into fractional chaotic systems for the …
Image encryption algorithm based on a novel cascade chaotic system and DNA mutation
P Li, X Zhang - Physica Scripta, 2024 - iopscience.iop.org
The image is an important medium for information transfer. To ensure image security and
improve encryption efficiency, a novel image encryption algorithm is proposed in this paper …
improve encryption efficiency, a novel image encryption algorithm is proposed in this paper …
[PDF][PDF] Protecting Sensitive Images with Improved 6-D Logistic Chaotic Image Steganography.
In the digital age, strong methods for safeguarding sensitive data are essential. Image
steganography is a practical technique for data protection that hides information inside …
steganography is a practical technique for data protection that hides information inside …