Lightweight three-factor authentication protocol for 6G-enabled healthcare systems using Chebyshev chaotic maps and BioHashing. [PDF]
Abbas AM, Nasr ME, Abdelfatah RI.
europepmc +1 more source
A Pt‐Fe‐Sn alloy catalyst supported on activated carbon is synthesized via laser synthesis in liquid, introducing lattice distortions that enhance active site exposure and toluene desorption. The catalyst achieves a hydrogen evolution rate of 2625 mmol gPt⁻¹ min⁻¹ with 99.96% selectivity and excellent stability, offering a promising strategy for ...
Zheng Wang +5 more
wiley +1 more source
A multi-branch feature enhancement-based detection and hierarchical chaotic encryption fusion method for sensitive targets in remote sensing images. [PDF]
Zhang Q, Wang H, Li X, Zhang S, Liu J.
europepmc +1 more source
A Hybrid Transformer–CNN Framework for Semantic Behavioral Modeling in Office Malware Detection
ABSTRACT Office documents have emerged as a prevalent attack vector, with adversaries increasingly embedding executable payloads and malicious macros to evade signature‐based detection mechanisms. To address these challenges, this study presents a hybrid Transformer–CNN semantic behavioral modeling framework for Office malware detection.
Sheikh M. Zeeshan Javed +4 more
wiley +1 more source
Synchronizing LLM-based semantic knowledge bases via secure federated fine-tuning in semantic communication. [PDF]
Li L +6 more
europepmc +1 more source
Mixed Shared-Distributed Hash Tables Approaches for Parallel State Space Construction
Rodrigo T. Saad +2 more
openalex +1 more source
Warming Trend in the Western Indian Ocean Driven by Oceanic Transport
Abstract The ocean has absorbed over 90% of the excess heat trapped in the Earth system due to rising greenhouse gas emissions, with upper layers playing a crucial role. This study finds that 35% of the total ocean heat content (OHC) in the western Indian Ocean is stored within the upper 300 m.
Ligin Joseph +6 more
wiley +1 more source
A secure multi phase authentication protocol for cloud infrastructure using elliptic curve cryptography. [PDF]
Sivasankar R, Marikkannan M.
europepmc +1 more source
Blind Rendezvous Distributed Hash Table for Anonymous Peer Discovery
Venkata Rao Dechiraju
openalex +1 more source

