A secure and efficient log storage and query framework based on blockchain

W Li, Y Feng, N Liu, Y Li, X Fu, YT Yu - Computer Networks, 2024 - Elsevier
Log data is crucial for security threat detection and audit analysis. However, traditional log
systems are susceptible to tampering, posing a significant security risk to information …

A survey on security of UAV and deep reinforcement learning

BS Sarıkaya, Ş Bahtiyar - Ad Hoc Networks, 2024 - Elsevier
Recently, the use of unmanned aerial vehicles (UAV) s for accomplishing various tasks has
gained a significant interest from both civilian and military organizations due to their …

[HTML][HTML] SDN-based detection and mitigation of DDoS attacks on smart homes

UH Garba, AN Toosi, MF Pasha, S Khan - Computer Communications, 2024 - Elsevier
The adoption of the Internet of Things (IoT) has proliferated across various domains, where
everyday objects like refrigerators and washing machines are now equipped with sensors …

An attention mechanism augmented CNN-GRU method integrating optimized variational mode decomposition and frequency feature classification for complex signal …

C Wei, Z Quan, Z Qian, H Pang, Y Su… - Expert Systems with …, 2025 - Elsevier
The nonlinearity, nonsmoothness, and high-noise characteristics of complex signals pose
challenges to accurate prediction in fields such as geoscience and energy. This paper …

CRO-PUF: Resilience to machine learning and differential power attacks

A Miah, FS Hossain - Computers & Security, 2025 - Elsevier
Internet-connected electrical appliances in the Internet of Things (IoT) exchange vital data
daily. IoT devices use cryptographic techniques with secret keys to encrypt and decrypt data …

Enhanced privacy-preserving distributed deep learning with application to fog-based IoT

E Antwi-Boasiako, S Zhou, Y Liao, E Kuada, EK Danso - Internet of Things, 2024 - Elsevier
Generally, privacy-preserving distributed deep learning (PPDDL) solutions provided so far
present a trade-off between privacy and efficiency/effectiveness, especially, in terms of high …

Heuristic genetic algorithm parameter optimizer: Making lossless compression algorithms efficient and flexible

W Wang, W Chen, L Yan, Y Yang, H Zhao - Expert Systems with …, 2025 - Elsevier
The processing of large volumes of time series data across various fields presents
significant challenges, particularly when it comes to effectively managing floating-point …

Hardware security against IP piracy using secure fingerprint encrypted fused amino-acid biometric with facial anthropometric signature

A Sengupta, A Anshul, AK Singh - Microprocessors and Microsystems, 2025 - Elsevier
In the era of modern global design supply chain, the emergence of hardware threats is on
the rise. Conventional hardware security techniques may fall short in terms of offering …

Attack from malicious access points in cell-free massive MIMO systems: Performance analysis and countermeasure

L Sun, R Wang, W Xu - Ad Hoc Networks, 2025 - Elsevier
This paper investigates physical-layer security (PLS) in a cell-free massive MIMO network. It
has been demonstrated that malicious access points (APs) can significantly compromise the …

Optimizing Energy Infrastructure with AI Technology: A Literature Review

OR Ajao - Open Journal of Applied Sciences, 2024 - scirp.org
The world's energy industry is experiencing a significant transformation due to increased
energy consumption, the rise in renewable energy usage, and the demand for sustainability …