Population growth in Turkey has led to significant congestion in transportation systems. This congestion results in delays for individuals using public transportation, often causing them to arrive hours early to ensur...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open ...
详细信息
Wireless body area networks(WBANs)are an emerging technology for the real-time monitoring of physiological *** provide a mechanism for collecting,storing,and transmitting physiological data to healthcare ***,the open wireless channel and limited resources of sensors bring security *** ensure physiological data security,this paper provides an efficient Certificateless Public Key Infrastructure Heterogeneous Ring Signcryption(CP-HRSC)scheme,in which sensors are in a certificateless cryptosystem(CLC)environment,and the server is in a public key infrastructure(PKI)*** could solve the limitations of key escrow in identity-based cryptography(IBC)and certificate management for public keys in *** PKI is suited for the server because it is widely used on the ***,this paper designs a ring signcryption method that allows the controller to anonymously encrypt physiological data on behalf of a set of sensors,but the server does not exactly know who the sensor *** construction of this paper can achieve anonymity,confidentiality,authentication,non-repudiation,and integrity in a logically single *** the computational Diffie-Hellman(CDH)problem,the formal security proof is provided in the random oracle model(ROM).This paper demonstrates that this scheme has indistinguishability against adaptive chosen ciphertext attacks(IND-CCA2)and existential unforgeability against adaptive chosen message attacks(EUF-CMA).In terms of computational cost and energy usage,a comprehensive performance analysis demonstrates that the proposed scheme is the most *** to the three existing schemes,the computational cost of this paper’s scheme is reduced by about 49.5%,4.1%,and 8.4%,and the energy usage of our scheme is reduced by about 49.4%,3.7%,and 14.2%,respectively.
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
The extreme learning machine is a fast neural network with outstanding performance. However, the selection of an appropriate number of hidden nodes is time-consuming, because training must be run for several values, a...
详细信息
This research seeks to use parameter reduction optimization to improve the understanding of consumer behavior gained from Association Rule mining where the density of the data set is low. Low density occurs where smal...
详细信息
This study presents a real-time streetlamp detection system using a Raspberry Pi and dashcam, leveraging YOLOv5 and YOLOv8 models. Tested in various conditions, YOLOv8n outperformed YOLOv5n with a mean Average Precisi...
详细信息
Security concerns have been one of the main hinderance for large-scale industrial internet-of-things (IoT) deployments. IoT is actively deployed in industrial sectors such as mining, power generation and transmissions...
详细信息
One type of insurance that people purchase to cover unexpected medical expenses is health insurance. In exchange for premium payments, the insurance company may cover a portion of the insured person's medical expe...
详细信息
Today, image processing plays a significant role in early disease detection, allowing doctors to treat conditions like breast, lung, and brain malignancies. A brain tumor is a serious condition that can be fatal. Brai...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,inform...
详细信息
Recently,deep image-hiding techniques have attracted considerable attention in covert communication and high-capacity information ***,these approaches have some *** example,a cover image lacks self-adaptability,information leakage,or weak *** address these issues,this study proposes a universal and adaptable image-hiding ***,a domain attention mechanism is designed by combining the Atrous convolution,which makes better use of the relationship between the secret image domain and the cover image ***,to improve perceived human similarity,perceptual loss is incorporated into the training *** experimental results are promising,with the proposed method achieving an average pixel discrepancy(APD)of 1.83 and a peak signal-to-noise ratio(PSNR)value of 40.72 dB between the cover and stego images,indicative of its high-quality ***,the structural similarity index measure(SSIM)reaches 0.985 while the learned perceptual image patch similarity(LPIPS)remarkably registers at ***,self-testing and cross-experiments demonstrate the model’s adaptability and generalization in unknown hidden spaces,making it suitable for diverse computer vision tasks.
暂无评论