4.7 Article

A Survey on Representation Learning Efforts in Cybersecurity Domain

Related references

Note: Only part of the references are listed.
Article Computer Science, Software Engineering

Image encryption based on a single-round dictionary and chaotic sequences in cloud computing

Yinghua Li et al.

Summary: With the increasing popularity of multimedia technology, there are severe security problems in information and communication systems, making image encryption crucial for preserving privacy. Compressive sensing technology can efficiently encrypt and compress images, improving security and quality.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2021)

Article Computer Science, Theory & Methods

Big Data analytics and Computational Intelligence for Cyber-Physical Systems: Recent trends and state of the art applications

Rahat Iqbal et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Information Systems

High Performance Computing for Cyber Physical Social Systems by Using Evolutionary Multi-Objective Optimization Algorithm

Gai-Ge Wang et al.

IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING (2020)

Article Computer Science, Theory & Methods

QASEC: A secured data communication scheme for mobile Ad-hoc networks

Muhammad Usman et al.

FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE (2020)

Article Computer Science, Software Engineering

A Gaussian error correction multi-objective positioning model with NSGA-II

Penghong Wang et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Computer Science, Software Engineering

An under-sampled software defect prediction method based on hybrid multi-objective cuckoo search

Xingjuan Cai et al.

CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE (2020)

Article Engineering, Multidisciplinary

A Mobile Multimedia Data Collection Scheme for Secured Wireless Multimedia Sensor Networks

Muhammad Usman et al.

IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING (2020)

Article Computer Science, Theory & Methods

Optimal LEACH protocol with modified bat algorithm for big data sensing systems in Internet of Things

Zhihua Cui et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2019)

Letter Computer Science, Information Systems

A pigeon-inspired optimization algorithm for many-objective optimization problems

Zhihua Cui et al.

SCIENCE CHINA-INFORMATION SCIENCES (2019)

Article Engineering, Electrical & Electronic

Multi-Objective Three-Dimensional DV-Hop Localization Algorithm With NSGA-II

Xingjuan Cai et al.

IEEE SENSORS JOURNAL (2019)

Article Computer Science, Artificial Intelligence

Hybrid multi-objective cuckoo search with dynamical local search

Maoqing Zhang et al.

MEMETIC COMPUTING (2018)

Article Automation & Control Systems

Detection of Malicious Code Variants Based on Deep Learning

Zhihua Cui et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2018)

Article Computer Science, Theory & Methods

A novel oriented cuckoo search algorithm to improve DV-Hop performance for cyber-physical systems

Zhihua Cui et al.

JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING (2017)