[HTML][HTML] A risk assessment framework for mobile apps in mobile cloud computing environments

NO Ogwara, K Petrova, ML Yang, SG MacDonell - Future Internet, 2024 - mdpi.com
Mobile devices (MDs) are used by mobile cloud computing (MCC) customers and by other
users because of their portability, robust connectivity, and ability to house and operate third …

Designing deep learning-enabled surveillance model with classified security levels for smart area networks

T Lee, H Kim, S Zeadally - Ad Hoc Networks, 2025 - Elsevier
As the urban population grows and city infrastructures become more complex, the need for
efficient and responsive security systems in smart buildings becomes increasingly crucial …

[HTML][HTML] Next-Gen solutions: Deep learning-enhanced design of joint cognitive radar and communication systems for noisy channel environments

MF Munir, A Basit, W Khan, A Saleem, A Khaliq… - Computers and …, 2024 - Elsevier
In recent years, the dual-function radar and communication (DFRC) paradigm has emerged
as a focal point in addressing spectrum congestion challenges. However, prevailing …

Deep Learning Approach for Pitting Corrosion Detection in Gas Pipelines

I Malashin, V Tynchenko, V Nelyub, A Borodulin… - Sensors, 2024 - mdpi.com
The paper introduces a computer vision methodology for detecting pitting corrosion in gas
pipelines. To achieve this, a dataset comprising 576,000 images of pipelines with and …

CNN-ViT synergy: An efficient Android malware detection approach through deep learning

MS Wasif, MP Miah, MS Hossain, MJF Alenazi… - Computers and …, 2025 - Elsevier
The surge in malicious Android applications poses a significant risk to global smartphone
security which demands robust detection strategies that are both effective and efficient …

Dynamic malware detection based on supervised contrastive learning

S Yang, Y Yang, D Zhao, L Xu, X Li, F Yu… - Computers and Electrical …, 2025 - Elsevier
Abstract Application Programming Interface (API) calls record interactions between a
program and the operating system or other programs during runtime. Due to this precise …

Physical layer security communication for IoT-aided intelligent transport systems: An approach in WFRFT signal domain

H Dong, R Gao, J Li, X Fang, X Sha, Z Li - Computers and Electrical …, 2024 - Elsevier
The security and reliability of communication systems are crucial for Intelligent Transport
Systems (ITS), ensuring user data privacy and the transportation network's stable operation …

A Defense Mechanism Against LOKI Attacks in Federated Learning for Enhancing Big Data Privacy in Mobile Systems

F Nawshin, D Unal… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
With the exponential growth of mobile applications, Android systems have become a
significant source of big data which provides both vast opportunities and substantial privacy …

Comprehensive Android Malware Detection: Leveraging Machine Learning and Sandboxing Techniques Through Static and Dynamic Analysis

P Bhooshan, N Sonkar - … Conference on Mobile Ad-Hoc and …, 2024 - ieeexplore.ieee.org
Android malware has grown alongside Android smartphones in recent years. One of the
fastest-growing sectors worldwide is the Internet of Things (IoT). The large number of third …

Android Based Malware Detection Technique Using Machine Learning Algorithms

A Iqubal, SK Tiwari, S Azad… - 2024 First International …, 2024 - ieeexplore.ieee.org
The threat landscape has drastically become immense due to the increasing number of
Android devices and applications. Android malware detection is an area of research that has …