Deep residual learning for image recognition: A survey
Deep Residual Networks have recently been shown to significantly improve the
performance of neural networks trained on ImageNet, with results beating all previous …
performance of neural networks trained on ImageNet, with results beating all previous …
Blockchain intelligence for internet of vehicles: Challenges and solutions
With the development of communication and networking technologies, the Internet of
Vehicles (IoV) has become the foundation of smart transportation. The development of …
Vehicles (IoV) has become the foundation of smart transportation. The development of …
Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
Future smart cities are the key to fulfilling the ever-growing demands of citizens. Information
and communication advancements will empower better administration of accessible …
and communication advancements will empower better administration of accessible …
Cyber security in iot-based cloud computing: A comprehensive survey
Cloud computing provides the flexible architecture where data and resources are dispersed
at various locations and are accessible from various industrial environments. Cloud …
at various locations and are accessible from various industrial environments. Cloud …
Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey
The Internet of Things (IoT) revitalizes the world with tremendous capabilities and potential
to be utilized in vehicular networks. The Smart Transport Infrastructure (STI) era depends …
to be utilized in vehicular networks. The Smart Transport Infrastructure (STI) era depends …
A comprehensive survey of AI-enabled phishing attacks detection techniques
In recent times, a phishing attack has become one of the most prominent attacks faced by
internet users, governments, and service-providing organizations. In a phishing attack, the …
internet users, governments, and service-providing organizations. In a phishing attack, the …
Analysis of cyber security attacks and its solutions for the smart grid using machine learning and blockchain methods
Smart grids are rapidly replacing conventional networks on a worldwide scale. A smart grid
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …
has drawbacks, just like any other novel technology. A smart grid cyberattack is one of the …
A comprehensive survey on computer forensics: State-of-the-art, tools, techniques, challenges, and future directions
With the alarmingly increasing rate of cybercrimes worldwide, there is a dire need to combat
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …
cybercrimes timely and effectively. Cyberattacks on computing machines leave certain …
Hand gesture classification using a novel CNN-crow search algorithm
Human–computer interaction (HCI) and related technologies focus on the implementation of
interactive computational systems. The studies in HCI emphasize on system use, creation of …
interactive computational systems. The studies in HCI emphasize on system use, creation of …
The Rise of “Internet of Things”: Review and Open Research Issues Related to Detection and Prevention of IoT‐Based Security Attacks
This paper provides an extensive and complete survey on the process of detecting and
preventing various types of IoT‐based security attacks. It is designed for software …
preventing various types of IoT‐based security attacks. It is designed for software …