Search
Search Results
-
DMFNet: deep matrix factorization network for image compressed sensing
Due to its outstanding performance in image processing, deep learning (DL) is successfully utilized in compressed sensing (CS) reconstruction....
-
Acnn: arbitrary trace attacks based on leakage area detection
Deep Learning-based Side-Channel Analysis (DL-SCA) has emerged as a powerful method in the field of side-channel analysis. Current works on DL-SCA...
-
A revolutionary approach to use convolutional spiking neural networks for robust intrusion detection
In an era dominated by network connectivity, the reliance on robust and secure networks has become paramount. With the advent of 5G and the Internet...
-
A novel real-time object detection method for complex road scenes based on YOLOv7-tiny
Road object detection is a key technology in intelligent transportation systems, playing a crucial role in ensuring driving safety and enhancing...
-
Progressive secret image sharing based on Boolean operations and polynomial interpolations
With the expansion of network bandwidth and the rise of social networks, image sharing on open networks has become a trend. The ensuing privacy...
-
Catch fish optimization algorithm: a new human behavior algorithm for solving clustering problems
This paper is inspired by traditional rural fishing methods and proposes a new metaheuristic optimization algorithm based on human behavior: Catch...
-
HOGWO: a fog inspired optimized load balancing approach using hybridized grey wolf algorithm
A distributed archetype, the concept of fog computing relocates the storage, computation, and services closer to the network’s edge, where the data...
-
Unraveling the code: an in-depth empirical study on the impact of development practices in auxiliary functions implementation
Auxiliary functions in software systems, often overlooked due to their perceived simplicity, play a crucial role in overall system reliability. This...
-
Adaptive spatio-temporal graph convolutional network with attention mechanism for mobile edge network traffic prediction
In the current era of mobile edge networks, a significant challenge lies in overcoming the limitations posed by limited edge storage and...
-
An authentication mechanism based on blockchain for IoT environment
The Internet of Things (IoT) is a network where physical objects with unique addresses can connect and communicate with each other through the...
-
Attention-guided LiDAR segmentation and odometry using image-to-point cloud saliency transfer
LiDAR odometry estimation and 3D semantic segmentation are crucial for autonomous driving, which has achieved remarkable advances recently. However,...
-
A hybrid northern goshawk optimization algorithm based on cluster collaboration
To address the problems that the northern goshawk optimization algorithm (NGO) has a slow convergence speed and is highly susceptible to fall into...
-
A two-way trust routing scheme to improve security in fog computing environment
Compliance with security requirements in the fog computing environment is known as an important phenomenon in maintaining the quality of service due...
-
Unmanned aerial vehicle assisted communication: applications, challenges, and future outlook
With the advancement of wireless communication technology, the number of wireless network terminals has exploded, and various new business scenarios...
-
Energy-efficient communication-aware VM placement in cloud datacenter using hybrid ACO–GWO
Virtual machine placement (VMP) is the process of map** virtual machines to physical machines, which is very important for resource utilization in...
-
A comprehensive survey on DDoS detection, mitigation, and defense strategies in software-defined networks
Software Defined Networking (SDN) has become increasingly prevalent in cloud computing, Internet of Things (IoT), and various environments to...
-
DPHM-Net:de-redundant multi-period hybrid modeling network for long-term series forecasting
Deep learning models have been widely applied in the field of long-term forecasting has achieved significant success, with the incorporation of...
-
A novel hybrid Artificial Gorilla Troops Optimizer with Honey Badger Algorithm for solving cloud scheduling problem
Cloud computing has revolutionized the way a variety of ubiquitous computing resources are provided to users with ease and on a pay-per-usage basis....
-
Designing quantum-secure attribute-based encryption
In the last couple of decades, Attribute-Based Encryption (ABE) has been a promising encryption technique to realize fine-grained access control over...
-
Generalized Welsch penalty for edge-aware image decomposition
Edge-aware image decomposition is an essential topic in the field of multimedia signal processing. In this paper, we propose a novel non-convex...