Data Component Method Based on Dual-Factor Ownership Identification with Multimodal Feature Fusion. [PDF]
Nie S, Shi J, Zhou X, Lu M.
europepmc +1 more source
UAV Based Data Access Communication Control in Distributed Hash Table Mechanism
Shaik Mohammad Rafi
openalex +2 more sources
Digital‐Twin‐Enabled, Time‐Aware Anomaly Detection for Industrial Cyber‐Physical Systems
The graphical abstract (Graphical Abstract figure) summarises the proposed pipeline: multivariate ICS data streams are windowed and normalised, fed into a temporal LSTM–DNN encoder and per‐sensor operating‐envelope learner, combined via calibrated fusion and finally surfaced through an operator‐facing digital twin that provides event timelines, top ...
Wulfran Fendzi Mbasso +5 more
wiley +1 more source
Synchronizing LLM-based semantic knowledge bases via secure federated fine-tuning in semantic communication. [PDF]
Li L +6 more
europepmc +1 more source
Whanau: A Sybil-Proof Distributed Hash Table
Whānau is a novel routing protocol for distributed hash tables (DHTs) that is efficient and strongly resistant to the Sybil attack. Whānau uses the social connections between users to build routing tables that enable Sybil-resistant lookups. The number of Sybils in the social network does not affect the protocol’s performance, but links between ...
Kaashoek, M. Frans +1 more
openaire +1 more source
The charging station (CS) plays a crucial role in charging electric vehicles. Therefore, it is necessary to protect the CS from cyberattacks. This paper proposes an architecture for the security of the EV fleet during charging using the XGBoost model and Hyperledger Fabric to protect battery management systems (BMS) from cyberattacks.
Gaurav Kumar, Suresh Mikkili
wiley +1 more source
MC-LBTO: secure and resilient state-aware multi-controller framework with adaptive load balancing for SD-IoT performance optimization. [PDF]
Alyanbaawi A +5 more
europepmc +1 more source
KANSA: high interoperability e-KTP decentralised database network using distributed hash table
Rolly Maulana Awangga +2 more
openalex +1 more source
Localization With Approximate Nearest Neighbour Search
Localization and place recognition are crucial in fields like autonomous driving and robotics, but real‐time performance is challenging with exact nearest neighbour search methods in large‐scale scenarios. The authors propose using an approximate nearest neighbour search method, specifically the hierarchical navigable small world (HNSW) structure ...
Roland Kotroczó +4 more
wiley +1 more source
Routing Protocols of Distributed Hash Table Based Peer to Peer Networks
Iosr Journals, S Rajalakshmi
openalex +2 more sources

