A secure and efficient log storage and query framework based on blockchain
W Li, Y Feng, N Liu, Y Li, X Fu, YT Yu - Computer Networks, 2024 - Elsevier
Log data is crucial for security threat detection and audit analysis. However, traditional log
systems are susceptible to tampering, posing a significant security risk to information …
systems are susceptible to tampering, posing a significant security risk to information …
A survey on security of UAV and deep reinforcement learning
Recently, the use of unmanned aerial vehicles (UAV) s for accomplishing various tasks has
gained a significant interest from both civilian and military organizations due to their …
gained a significant interest from both civilian and military organizations due to their …
[HTML][HTML] SDN-based detection and mitigation of DDoS attacks on smart homes
The adoption of the Internet of Things (IoT) has proliferated across various domains, where
everyday objects like refrigerators and washing machines are now equipped with sensors …
everyday objects like refrigerators and washing machines are now equipped with sensors …
An attention mechanism augmented CNN-GRU method integrating optimized variational mode decomposition and frequency feature classification for complex signal …
C Wei, Z Quan, Z Qian, H Pang, Y Su… - Expert Systems with …, 2025 - Elsevier
The nonlinearity, nonsmoothness, and high-noise characteristics of complex signals pose
challenges to accurate prediction in fields such as geoscience and energy. This paper …
challenges to accurate prediction in fields such as geoscience and energy. This paper …
CRO-PUF: Resilience to machine learning and differential power attacks
A Miah, FS Hossain - Computers & Security, 2025 - Elsevier
Internet-connected electrical appliances in the Internet of Things (IoT) exchange vital data
daily. IoT devices use cryptographic techniques with secret keys to encrypt and decrypt data …
daily. IoT devices use cryptographic techniques with secret keys to encrypt and decrypt data …
Enhanced privacy-preserving distributed deep learning with application to fog-based IoT
Generally, privacy-preserving distributed deep learning (PPDDL) solutions provided so far
present a trade-off between privacy and efficiency/effectiveness, especially, in terms of high …
present a trade-off between privacy and efficiency/effectiveness, especially, in terms of high …
Heuristic genetic algorithm parameter optimizer: Making lossless compression algorithms efficient and flexible
W Wang, W Chen, L Yan, Y Yang, H Zhao - Expert Systems with …, 2025 - Elsevier
The processing of large volumes of time series data across various fields presents
significant challenges, particularly when it comes to effectively managing floating-point …
significant challenges, particularly when it comes to effectively managing floating-point …
Hardware security against IP piracy using secure fingerprint encrypted fused amino-acid biometric with facial anthropometric signature
In the era of modern global design supply chain, the emergence of hardware threats is on
the rise. Conventional hardware security techniques may fall short in terms of offering …
the rise. Conventional hardware security techniques may fall short in terms of offering …
Attack from malicious access points in cell-free massive MIMO systems: Performance analysis and countermeasure
L Sun, R Wang, W Xu - Ad Hoc Networks, 2025 - Elsevier
This paper investigates physical-layer security (PLS) in a cell-free massive MIMO network. It
has been demonstrated that malicious access points (APs) can significantly compromise the …
has been demonstrated that malicious access points (APs) can significantly compromise the …
Optimizing Energy Infrastructure with AI Technology: A Literature Review
OR Ajao - Open Journal of Applied Sciences, 2024 - scirp.org
The world's energy industry is experiencing a significant transformation due to increased
energy consumption, the rise in renewable energy usage, and the demand for sustainability …
energy consumption, the rise in renewable energy usage, and the demand for sustainability …