Results 131 to 140 of about 65,060 (255)

Deep Fusion: A High‐Performance AI Framework for Colorectal Cancer Grading

open access: yesInternational Journal of Imaging Systems and Technology, Volume 36, Issue 1, January 2026.
ABSTRACT Automated, precise histopathological grading of colorectal cancer (CRC) is vital for prognosis and treatment but is challenged by inter‐observer variability and time demands. This study introduces and evaluates a novel deep learning framework for robust four‐class grading of colorectal adenocarcinoma (Normal, Well, Moderately, and Poorly ...
Muhammed Emin Bedir   +3 more
wiley   +1 more source

Entanglement in Quantum Systems Based on Directed Graphs

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
The entanglement properties of quantum states associated with directed graphs are investigated. It is proved that the vertex degree distribution fully determines this entanglement measure, which remains invariant under vertex relabeling, thereby highlighting its topological character.
Lucio De Simone, Roberto Franzosi
wiley   +1 more source

Secure Authentication via Quantum Physical Unclonable Functions: A Review

open access: yesAdvanced Quantum Technologies, Volume 9, Issue 1, January 2026.
This in‐depth review article examines the origins, development, and evolution of Quantum Physical Unclonable Functions (QPUFs), with a particular focus on their use in secure authentication. The topic is motivated and introduced in detail, addressing both theoretical foundations and practical implementations, and is supported by a systematic article ...
Pol Julià Farré   +8 more
wiley   +1 more source

Phase‐Changing Vanadium Oxides for Electromagnetic Radiation Management

open access: yesSmall Science, Volume 6, Issue 1, January 2026.
Vanadium dioxide's reversible insulator‐to‐metal transition near room temperature enables ultrafast, broadband electromagnetic modulation from ultraviolet to radiofrequencies. With femtosecond switching speeds and cycling endurance exceeding 100 million cycles, VO2 metasurfaces achieve tuneable absorption, beam steering, and polarisation control. These
Mohammad Taha   +2 more
wiley   +1 more source

Communication‐Security Co‐Design for Federated Learning in Grant‐Free NOMA IoT Networks

open access: yesIET Communications, Volume 20, Issue 1, January/December 2026.
This article presents SA‐PPO, a Security‐Aware Proximal Policy Optimisation framework for federated learning over grant‐free NOMA (non‐orthogonal multiple access) in IoT networks. By jointly optimising access control, resource allocation, and trust‐weighted aggregation using cross‐layer indicators, SA‐PPO enhances both communication reliability and ...
Emmanuel Atebawone   +5 more
wiley   +1 more source

Modeling and Stability Analysis of Malware Propagation in Hierarchically Protected WSNs Based on Epidemiological Theory

open access: yesIET Control Theory &Applications, Volume 20, Issue 1, January/December 2026.
This paper proposes a novel malware propagation model based on epidemiological theory, specifically tailored for hierarchically protected wireless sensor networks (WSNs). We classify nodes into strongly and weakly protected categories and establish a four‐state propagation dynamics model (susceptible, exposed, infected, and recovered) to simulate ...
Xuejin Zhu, Nan Fu
wiley   +1 more source

Algorithms of the protected information exchange in radio channels of a space navigation system

open access: yesИзвестия высших учебных заведений России: Радиоэлектроника, 2015
To improve the security of information exchange throw navigation space system radio channels to prevent unauthorized use of the system is proposed to use high accuracy cryptographic methods to protect signal.
S. V. Shtanko, D. A. Lesnyk
doaj  

Design and Implementation of XGBoost‐Based Cyberattack Detection and Blockchain‐Enabled Charging Station

open access: yesDigital Twins and Applications, Volume 3, Issue 1, January/December 2026.
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

(Not Surprising) Attacks on Recent Pairing‐Free Attribute‐Based Encryption Schemes

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
The fact that designing secure and efficient identity or attribute‐based encryption (ABE) schemes requires the use of specific algebraic tools like bilinear pairings or lattices is well known in the cryptographic community. However, some journals whose main topics are not cryptographic still publish papers proposing, for instance, ABE schemes in ...
Javier Herranz, Thomas Haines
wiley   +1 more source

Home - About - Disclaimer - Privacy