The applications of nature‐inspired algorithms in Internet of Things‐based healthcare service: A systematic literature review

Z Amiri, A Heidari, M Zavvar… - Transactions on …, 2024 - Wiley Online Library
Nature‐inspired algorithms revolve around the intersection of nature‐inspired algorithms
and the IoT within the healthcare domain. This domain addresses the emerging trends and …

[HTML][HTML] Intelligent architecture and platforms for private edge cloud systems: A review

X Xu, S Zang, M Bilal, X Xu, W Dou - Future Generation Computer Systems, 2024 - Elsevier
The development of cloud, fog, and edge computing has led to great advances in reducing
latency and saving bandwidth, and these methods have therefore been broadly applied in …

A novel blockchain-based deepfake detection method using federated and deep learning models

A Heidari, NJ Navimipour, H Dag, S Talebi… - Cognitive Computation, 2024 - Springer
In recent years, the proliferation of deep learning (DL) techniques has given rise to a
significant challenge in the form of deepfake videos, posing a grave threat to the authenticity …

Secure data integrity check based on verified public key encryption with equality test for multi-cloud storage

W Li, W Susilo, C **a, L Huang, F Guo… - IEEE transactions on …, 2024 - ieeexplore.ieee.org
Cloud computing eliminates the need for local hardware, addressing the challenge of high
computing expenses. However, entrusting data to the cloud may pose the risk of …

Secure AI for 6G mobile devices: Deep learning optimization against side-channel attacks

AA Ahmed, MK Hasan, I Memon… - IEEE Transactions …, 2024 - ieeexplore.ieee.org
Deep learning-driven side-channel analysis (SCA) is a promising approach to side-channel
analytic profiling. Recent studies have shown that neural networks can successfully attack …

Advancements in intrusion detection: A lightweight hybrid RNN-RF model

N Khan, MI Mohmand, S Rehman, Z Ullah, Z Khan… - Plos one, 2024 - journals.plos.org
Computer networks face vulnerability to numerous attacks, which pose significant threats to
our data security and the freedom of communication. This paper introduces a novel intrusion …

Dynamic consensus committee-based for secure data sharing with authorized multi-receiver searchable encryption

N Yang, C Tang, Q Zhou, D He - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Data management services provided by the public cloud can economize the enterprise's
local storage costs, and meanwhile, realize data sharing among the enterprise. Corporate …

A deep analysis of nature-inspired and meta-heuristic algorithms for designing intrusion detection systems in cloud/edge and IoT: state-of-the-art techniques …

W Hu, Q Cao, M Darbandi, N Jafari Navimipour - Cluster Computing, 2024 - Springer
The number of cloud-, edge-, and Internet of Things (IoT)-based applications that produce
sensitive and personal data has rapidly increased in recent years. The IoT is a new model …

{FEASE}: Fast and Expressive Asymmetric Searchable Encryption

L Meng, L Chen, Y Tian, M Manulis, S Liu - 33rd USENIX Security …, 2024 - usenix.org
Asymmetric Searchable Encryption (ASE) is a promising cryptographic mechanism that
enables a semi-trusted cloud server to perform keyword searches over encrypted data for …

[HTML][HTML] A biometrics-generated private/public key cryptography for a blockchain-based e-voting system

JK Adeniyi, SA Ajagbe, EA Adeniyi, P Mudali… - Egyptian Informatics …, 2024 - Elsevier
Voting aims to provide the best decision or select the most selected option for the largest
group of voters. Malicious parties gaining access, and otherwise tampering with election …