Results 11 to 20 of about 120,057 (278)

Harden Deep Convolutional Classifiers via K-Means Reconstruction

open access: yesIEEE Access, 2020
Adversarial examples are carefully perturbed input examples that aim to mislead the deep neural network models into producing unexpected outputs. In this paper, we employ a K-means clustering algorithm as a pre-processing method to defend against ...
Fu Wang   +3 more
doaj   +1 more source

Analysis of Two-Worm Interaction Model in Heterogeneous M2M Network

open access: yesInformation, 2015
With the rapid development of M2M (Machine-to-Machine) networks, the damages caused by malicious worms are getting more and more serious. By considering the influences of the network heterogeneity on worm spreading, we are the first to study the complex ...
Jinhua Ma   +3 more
doaj   +1 more source

A Pairing-Free Certificateless Searchable Public Key Encryption Scheme for Industrial Internet of Things

open access: yesIEEE Access, 2023
The Industrial Internet of Things (IIoT) collects a large amount of data through various types of sensors and intelligently processes this data using cloud computing, which is flexible, efficient, and cost-effective.
Xiaoguang Liu   +3 more
doaj   +1 more source

Privacy-Preserving Mobile Roaming Authentication with Security Proof in Global Mobility Networks

open access: yesInternational Journal of Distributed Sensor Networks, 2014
Mobile roaming authentication scheme achieves the mutual authentication and session key establishment between the mobile user and the foreign agent. In 2013, Xie et al.
Qi Xie   +4 more
doaj   +1 more source

Separable Reversible Data Hiding Scheme in Homomorphic Encrypted Domain Based on NTRU

open access: yesIEEE Access, 2020
NTRU (Number Theory Research Unit) has the characteristics of resistance to quantum computing attacks, fast encryption and decryption, and high security. It is very suitable for wireless confidential data networks and authentication systems.
Neng Zhou   +4 more
doaj   +1 more source

Anomaly detection in images with shared autoencoders

open access: yesFrontiers in Neurorobotics, 2023
Anomaly detection is a classical problem in computer vision, namely the determination of the normal from the abnormal when datasets are highly biased toward one class (normal) due to the insufficient sample size of the other class (abnormal).
Haoyang Jia   +3 more
doaj   +1 more source

Computational and Energy Costs of Cryptographic Algorithms on Handheld Devices [PDF]

open access: yes, 2011
Networks are evolving toward a ubiquitous model in which heterogeneous devices are interconnected. Cryptographic algorithms are required for developing security solutions that protect network activity. However, the computational and energy limitations
Herrera JoancomartĂ­, Jordi   +1 more
core   +4 more sources

Evaluating Dynamic Approaches to Key (Re-)Establishment in Wireless Sensor Networks

open access: yesSensors, 2019
Wireless sensor networks with a large number of cheap low-power interconnected devices bring up challenging tasks when considering the security of their communications. In our previous work, we presented two approaches for the design of dynamic protocols
Lukas Nemec   +4 more
doaj   +1 more source

Quantum Cryptography

open access: yes, 1995
Quantum cryptography is a new method for secret communications offering the ultimate security assurance of the inviolability of a Law of Nature.
Bell J. S.   +30 more
core   +1 more source

A Pseudo DNA Cryptography Method

open access: yes, 2009
The DNA cryptography is a new and very promising direction in cryptography research. DNA can be used in cryptography for storing and transmitting the information, as well as for computation.
Celland   +20 more
core   +1 more source

Home - About - Disclaimer - Privacy