Results 11 to 20 of about 3,404,399 (295)
The LBC-3 lightweight encryption algorithm
This article presents a developed lightweight data encryption algorithm called LBC-3. Its essential difference from the known algorithms is the R1 function and the procedure for generating round keys.
Nyssanbayeva Saule +3 more
doaj +1 more source
Person Re-Identification Method Based on Dual Descriptor Feature Enhancement
Person re-identification is a technology used to identify individuals across different cameras. Existing methods involve extracting features from an input image and using a single feature for matching.
Ronghui Lin +5 more
doaj +1 more source
5G wireless P2MP backhaul security protocol: an adaptive approach
5G has introduced various emerging demands for new services and technologies that raised the bar for quality of service, latency, handovers, and data rates.
Jiyoon Kim +4 more
doaj +1 more source
An exploration of affine group laws for elliptic curves
Several forms of elliptic curves are suggested for an efficient implementation of Elliptic Curve Cryptography. However, a complete description of the group law has not appeared in the literature for most popular forms.
Hisil Huseyin +3 more
doaj +1 more source
Risk management-based security evaluation model for telemedicine systems
Background Infectious diseases that can cause epidemics, such as COVID-19, SARS-CoV, and MERS-CoV, constitute a major social issue, with healthcare providers fearing secondary, tertiary, and even quaternary infections.
Dong-won Kim +2 more
doaj +1 more source
Deepfake Detection Algorithm Based on Dual-Branch Data Augmentation and Modified Attention Mechanism
Mainstream deepfake detection algorithms generally fail to fully extract forgery traces and have low accuracy when detecting forged images with natural corruptions or human damage.
Da Wan +4 more
doaj +1 more source
Joint Modal Alignment and Feature Enhancement for Visible-Infrared Person Re-Identification
Visible-infrared person re-identification aims to solve the matching problem between cross-camera and cross-modal person images. Existing methods strive to perform better cross-modal alignment, but often neglect the critical importance of feature ...
Ronghui Lin +4 more
doaj +1 more source
In the construction of a telecom-fraud risk warning and intervention-effect prediction model, how to apply multivariate heterogeneous data to the front-end prevention and management of telecommunication network fraud has become one of the focuses of this
Mianning Hu +4 more
doaj +1 more source
Research on tor-based anonymous DDoS attack [PDF]
Based on Tor, an anonymous DDoS attack is proposed, and the attacker of this attack is very difficult to trace due to the strong anonymity of Tor. Through conducting experiments in different network environment and making analyzation of security, the ...
Wang Rui +4 more
doaj +1 more source
Hate Speech Detection Using Machine Learning: A Survey
Currently hate speech is a growing challenge for society, individuals, policymakers, and researchers, as social media platforms make it easy to anonymously create and grow online friends and followers, and provide an online forum for debate about ...
Seble, H., +7 more
doaj

