A comprehensive survey of covert communication techniques, limitations and future challenges

I Makhdoom, M Abolhasan, J Lipman - Computers & Security, 2022 - Elsevier
Data encryption aims to protect the confidentiality of data at storage, during transmission, or
while in processing. However, it is not always the optimum choice as attackers know the …

Blockchain meets covert communication: A survey

Z Chen, L Zhu, P Jiang, C Zhang, F Gao… - … Surveys & Tutorials, 2022 - ieeexplore.ieee.org
Covert communication enables covert information transmission in an undetectable way to
prevent the exposure of communication behaviors. Blockchain-based covert communication …

A survey on blockchain technology: Evolution, architecture and security

MNM Bhutta, AA Khwaja, A Nadeem, HF Ahmad… - Ieee …, 2021 - ieeexplore.ieee.org
Blockchain is a revolutionary technology that is making a great impact on modern society
due to its transparency, decentralization, and security properties. Blockchain gained …

Blockchain security attacks, challenges, and solutions for the future distributed iot network

S Singh, ASMS Hosen, B Yoon - Ieee Access, 2021 - ieeexplore.ieee.org
Blockchain technology is becoming increasingly attractive to the next generation, as it is
uniquely suited to the information era. Blockchain technology can also be applied to the …

Apple leaf disease recognition method with improved residual network

H Yu, X Cheng, C Chen, AA Heidari, J Liu, Z Cai… - Multimedia Tools and …, 2022 - Springer
The occurrence of apple diseases has dramatically affected the quality and yield of apples.
Disease monitoring is an important measure to ensure the healthy development of the apple …

Boosting whale optimization with evolution strategy and Gaussian random walks: An image segmentation method

AG Hussien, AA Heidari, X Ye, G Liang, H Chen… - Engineering with …, 2023 - Springer
Stochastic optimization has been found in many applications, especially for several local
optima problems, because of their ability to explore and exploit various zones of the feature …

Boosted kernel search: Framework, analysis and case studies on the economic emission dispatch problem

R Dong, H Chen, AA Heidari, H Turabieh… - Knowledge-Based …, 2021 - Elsevier
In recent years, a variety of meta-heuristic nature-inspired algorithms have been proposed to
solve complex optimization problems. However, these algorithms suffer from the …

Multilevel threshold image segmentation with diffusion association slime mould algorithm and Renyi's entropy for chronic obstructive pulmonary disease

S Zhao, P Wang, AA Heidari, H Chen… - Computers in Biology …, 2021 - Elsevier
Image segmentation is an essential pre-processing step and is an indispensable part of
image analysis. This paper proposes Renyi's entropy multi-threshold image segmentation …

Secure and efficient mutual authentication protocol for smart grid under blockchain

W Wang, H Huang, L Zhang, C Su - Peer-to-Peer Networking and …, 2021 - Springer
Smart grid has been acknowledged as the next-generation intelligent network that optimizes
energy efficiency. Primarily through a bidirectional communication channel, suppliers and …

Random reselection particle swarm optimization for optimal design of solar photovoltaic modules

Y Fan, P Wang, AA Heidari, H Chen, M Mafarja - Energy, 2022 - Elsevier
Renewable energy is becoming more popular due to environmental concerns about the
previous energy source. Accurate solar photovoltaic system model parameters substantially …