Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019‏ - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020‏ - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Deep learning for multigrade brain tumor classification in smart healthcare systems: A prospective survey

K Muhammad, S Khan, J Del Ser… - … on Neural Networks …, 2020‏ - ieeexplore.ieee.org
Brain tumor is one of the most dangerous cancers in people of all ages, and its grade
recognition is a challenging problem for radiologists in health monitoring and automated …

Secured IIoT against trust deficit-A flexi cryptic approach

VM Padmapriya, K Thenmozhi, M Hemalatha… - Multimedia Tools and …, 2024‏ - Springer
This research allows the secure surveillance approach for the Internet of Things (IoT)
methodology to be developed by integrating wireless signalling and image encryption …

Convolutional neural networks based fire detection in surveillance videos

K Muhammad, J Ahmad, I Mehmood, S Rho… - Ieee …, 2018‏ - ieeexplore.ieee.org
The recent advances in embedded processing have enabled the vision based systems to
detect fire during surveillance using convolutional neural networks (CNNs). However, such …

Efficient deep CNN-based fire detection and localization in video surveillance applications

K Muhammad, J Ahmad, Z Lv… - … on Systems, Man …, 2018‏ - ieeexplore.ieee.org
Convolutional neural networks (CNNs) have yielded state-of-the-art performance in image
classification and other computer vision tasks. Their application in fire detection systems will …

A decentralized lightweight blockchain-based authentication mechanism for IoT systems

U Khalid, M Asim, T Baker, PCK Hung, MA Tariq… - Cluster …, 2020‏ - Springer
Abstract The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous
technologies composed of smart ubiquitous objects that are seamlessly connected to the …

Spatiotemporal anomaly detection using deep learning for real-time video surveillance

R Nawaratne, D Alahakoon… - IEEE Transactions on …, 2019‏ - ieeexplore.ieee.org
Rapid developments in urbanization and autonomous industrial environments have
augmented and expedited the need for intelligent real-time video surveillance. Recent …

Asynchronous updating Boolean network encryption algorithm

S Gao, R Wu, X Wang, J Liu, Q Li… - IEEE Transactions on …, 2023‏ - ieeexplore.ieee.org
An asynchronous updating Boolean network is employed to simulate and analyze the gene
expression of a particular tissue or species, revealing the life activity process from a system …

Exploiting flexible and secure cryptographic technique for multi-dimensional image based on graph data structure and three-input majority gate

Y Sha, J Mou, S Banerjee… - IEEE transactions on …, 2023‏ - ieeexplore.ieee.org
The emergence of the Industrial Internet of Things (IIoT) has greatly improved the efficiency
of manufacturing, but it also faces significant security challenges during the operational …