Security, privacy and trust of different layers in Internet-of-Things (IoTs) framework

A Tewari, BB Gupta - Future generation computer systems, 2020 - Elsevier
Abstract Internet of Things (IoT) is playing an important role after its showing up, it covers
from traditional equipment to general household objects such as WSNs and RFID. With the …

Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network

W Wang, M Zhao, J Wang - Journal of Ambient Intelligence and …, 2019 - Springer
Android security incidents occurred frequently in recent years. To improve the accuracy and
efficiency of large-scale Android malware detection, in this work, we propose a hybrid model …

A machine learning based approach for phishing detection using hyperlinks information

AK Jain, BB Gupta - Journal of Ambient Intelligence and Humanized …, 2019 - Springer
This paper presents a novel approach that can detect phishing attack by analysing the
hyperlinks found in the HTML source code of the website. The proposed approach …

Sensitivity analysis of an attack-pattern discovery based trusted routing scheme for mobile ad-hoc networks in industrial IoT

RH Jhaveri, NM Patel, Y Zhong, AK Sangaiah - IEEE Access, 2018 - ieeexplore.ieee.org
Mobile ad-hoc networks (MANETs) are pervasive autonomous networks that will play a vital
role in future Industrial Internet-of-Things communication, where smart devices will be …

Multiple histograms based reversible data hiding by using FCM clustering

J Wang, N Mao, X Chen, J Ni, C Wang, Y Shi - Signal Processing, 2019 - Elsevier
Reversible data hiding algorithm (RDH) has been widely used in multimedia's copyright
protection and content integrity authentication. As a typical RDH scheme, histogram shifting …

Embellishment of upconversion nanoparticles with ultrasmall perovskite quantum dots for full‐color tunable, dual‐modal luminescence anticounterfeiting

K Du, M Zhang, Y Li, H Li, K Liu, C Li… - Advanced Optical …, 2021 - Wiley Online Library
Advanced fluorescent anticounterfeiting technology has attracted widespread attention and
encourages people to develop reliable luminescent materials with multiple colors and …

Phishing detection using machine learning technique

J Rashid, T Mahmood, MW Nisar… - 2020 first international …, 2020 - ieeexplore.ieee.org
Today, everyone is highly dependent on the internet. Everyone performed online shop**
and online activities such as online Bank, online booking, online recharge and more on …

A reliability-aware approach for resource efficient virtual network function deployment

J Sun, G Zhu, G Sun, D Liao, Y Li, AK Sangaiah… - IEEE …, 2018 - ieeexplore.ieee.org
Network function virtualization (NFV) is a promising technique aimed at reducing capital
expenditures (CAPEX) and operating expenditures (OPEX), and improving the flexibility and …

A packet-reordering covert channel over VoLTE voice and video traffics

X Zhang, L Zhu, X Wang, C Zhang, H Zhu… - Journal of Network and …, 2019 - Elsevier
Covert timing channels hide covert message in some timing behavior of an entity. The most
common entity is the inter-packet delays (IPDs) which are modulated to represent the covert …

A single-beam NIR laser-triggered full-color upconversion tuning of a Er/Tm: CsYb 2 F 7@ glass photothermal nanocomposite for optical security

J Zhu, S Wang, Z Yang, S Liao, J Lin, H Yao, F Huang… - Nanoscale, 2022 - pubs.rsc.org
The development of advanced luminescent materials is highly desirable for addressing the
rising threat of forgery. However, it is challenging to achieve stable full-color upconversion …