4.6 Article

A novel secure cryptography model for data transmission based on Rotor64 technique

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Artificial Intelligence

A chimp-inspired remora optimization algorithm for multilevel thresholding image segmentation using cross entropy

Qingxin Liu et al.

Summary: This paper presents a chimp-inspired remora optimization algorithm (HCROA) to search the optimal threshold levels for image segmentation. The HCROA adjusts the particles' positions using the Chimp Optimization Algorithm (ChOA) to achieve diversity and exploitation ability. Experimental results demonstrate that HCROA outperforms existing methods in terms of accuracy, robustness, and efficiency in image segmentation.

ARTIFICIAL INTELLIGENCE REVIEW (2023)

Article Computer Science, Information Systems

Improved dropping attacks detecting system in 5g networks using machine learning and deep learning approaches

Ala Mughaid et al.

Summary: This paper introduces the Non Orthogonal Multiple Access (NOMA) technology in 5G communications and proposes a methodology for wireless cyberattack detection in 5G networks using various machine learning and deep learning techniques. The simulation and experiments show high accuracy rates for detecting dropping attacks and achieving outstanding performance with the KNN algorithm, Decision Forest, and Neural Network.

MULTIMEDIA TOOLS AND APPLICATIONS (2023)

Article Computer Science, Information Systems

BAOA: Binary Arithmetic Optimization Algorithm With K-Nearest Neighbor Classifier for Feature Selection

Nima Khodadadi et al.

Summary: This paper proposes a binary version of the Arithmetic Optimization Algorithm (BAOA) to tackle the feature selection problem in classification. The BAOA uses the distribution behavior of main arithmetic operators and outperforms other binary algorithms in terms of classification accuracy, selected features, and optimum fitness values.

IEEE ACCESS (2023)

Article Computer Science, Information Systems

Secure Data Transmission Using Quantum Cryptography in Fog Computing

Cherry Mangla et al.

Summary: This article discusses the security challenges in fog computing and introduces quantum cryptography as a potential solution. It presents a use case highlighting the importance of quantum cryptography in fog computing and explores future research directions.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2022)

Article Computer Science, Information Systems

Cross layered cryptography based secure routing for IoT-enabled smart healthcare system

Ashwini Kore et al.

Summary: In the era of the Internet of Things, smart city applications such as e-healthcare have received significant attention. However, wireless sensor network-assisted IoT applications face challenges in terms of security, privacy, quality of service, and network lifespan. To address these challenges, we propose a novel Cross-Layer and Cryptography-based Secure Routing (CLCSR) protocol that ensures attack detection, privacy preservation, and secure data transmission. Experimental results demonstrate that the CLCSR protocol outperforms state-of-the-art protocols in terms of average throughput, packet delivery ratio, energy consumption, routing overhead, and cryptography time.

WIRELESS NETWORKS (2022)

Article Computer Science, Hardware & Architecture

Improved authentication and computation of medical data transmission in the secure IoT using hyperelliptic curve cryptography

B. Prasanalakshmi et al.

Summary: This paper focuses on the security, speed, and load of medical data transmission, combining steganographic methods with cryptographic algorithms to ensure data security. By encrypting and transmitting medical image and medical report data, the method proves its effectiveness in hiding medical transcription data.

JOURNAL OF SUPERCOMPUTING (2022)

Article Computer Science, Artificial Intelligence

An intelligent cybersecurity system for detecting fake news in social media websites

Ala Mughaid et al.

Summary: This paper explores the technique of automatically detecting fake news and proposes a method that uses the world rank of news websites as the main factor of news accuracy and compares current news with fake news to determine their accuracy. Experimental results show that the proposed method performs well in defining news accuracy.

SOFT COMPUTING (2022)

Article Engineering, Chemical

Improving Transactional Data System Based on an Edge Computing-Blockchain-Machine Learning Integrated Framework

Zeinab Shahbazi et al.

Summary: Smart manufacturing systems are developed based on the integration of blockchain, edge computing, and machine learning, which enable intelligent data analysis and processing. Edge computing ensures balanced computational workloads and provides timely responses for devices.

PROCESSES (2021)

Article Chemistry, Multidisciplinary

Information stored in nanoscale: Encoding data in a single DNA strand with Base64

Yi Zhang et al.

NANO TODAY (2020)

Article Computer Science, Information Systems

A Color Image Encryption Algorithm Based on One Time Key, Chaos Theory, and Concept of Rotor Machine

Aqeel Ur Rehman et al.

IEEE ACCESS (2020)

Article Computer Science, Theory & Methods

Review ofCryptography and Network Security: Principles and Practice, Fifth Edition

Chris Christensen

CRYPTOLOGIA (2010)