From google gemini to openai q*(q-star): A survey of resha** the generative artificial intelligence (ai) research landscape
This comprehensive survey explored the evolving landscape of generative Artificial
Intelligence (AI), with a specific focus on the transformative impacts of Mixture of Experts …
Intelligence (AI), with a specific focus on the transformative impacts of Mixture of Experts …
Autonomous vehicles: The cybersecurity vulnerabilities and countermeasures for big data communication
A Algarni, V Thayananthan - Symmetry, 2022 - mdpi.com
The possible applications of communication based on big data have steadily increased in
several industries, such as the autonomous vehicle industry, with a corresponding increase …
several industries, such as the autonomous vehicle industry, with a corresponding increase …
Medisecure: A blockchain-enabled ensemble learning approach for user-controlled single sign-on and privacy preservation in medical cyber-physical systems
The authentication of users and devices is essential to the security of cyber-physical systems
(CPS). But since various networks and devices are interconnected in CPS, they are …
(CPS). But since various networks and devices are interconnected in CPS, they are …
PhishTransformer: A Novel Approach to Detect Phishing Attacks Using URL Collection and Transformer
Phishing attacks are a major threat to online security, resulting in millions of dollars in
losses. These attacks constantly evolve, forcing the cyber security community to improve …
losses. These attacks constantly evolve, forcing the cyber security community to improve …
A face detection and recognition method built on the improved MobileFaceNet
Z Lu, C Zhou, H Wang - International Journal of Sensor …, 2024 - inderscienceonline.com
Face recognition has increasingly become the predominant biometric recognition
technology for identity verification, propelled by advancements in deep learning technology …
technology for identity verification, propelled by advancements in deep learning technology …
S-method: secure multimedia encryption technique in cloud environment
Security of multimedia content on the Cloud has emerged as the major research area in
today's era of the internet. Most exchange of multimedia content across the globe is done …
today's era of the internet. Most exchange of multimedia content across the globe is done …
Lightweight Security for IoT
With the ever-increasing demand for IoT Devices which enable all objects to connect and
exchange information in applications such as healthcare applications, Industry 4.0, smart …
exchange information in applications such as healthcare applications, Industry 4.0, smart …
Anomaly Detection in IoT Network Traffic Using Bidirectional 3D Quasi‐Recurrent Neural Network Optimize With Coati Optimization Algorithm
M Deivakani - Transactions on Emerging Telecommunications …, 2025 - Wiley Online Library
Anomaly detection in Internet of Things (IOT) network traffic involves identifying abnormal
patterns or behaviors, enabling early detection of potential security threats or system …
patterns or behaviors, enabling early detection of potential security threats or system …
A novel method for indian vehicle registration number plate detection and recognition using CNN
Automated reading of license plate and its detection is a crucial component of the competent
transportation system. Toll payment and parking management e-payment systems may …
transportation system. Toll payment and parking management e-payment systems may …
A classification and prediction model with the sparrow search-probabilistic neural network algorithm for transformer fault diagnosis
L Hu, L Yin, F Mo, Z Liang, Z Ruan… - International Journal of …, 2024 - inderscienceonline.com
We present a fault prediction model for transformers to improve the accuracy of transformer
fault (TF) prediction. The model is predicated on a probabilistic neural network (PNN) that is …
fault (TF) prediction. The model is predicated on a probabilistic neural network (PNN) that is …