Secure and robust digital image watermarking using coefficient differencing and chaotic encryption
This paper presents a chaotic encryption-based blind digital image watermarking technique
applicable to both grayscale and color images. Discrete cosine transform (DCT) is used …
applicable to both grayscale and color images. Discrete cosine transform (DCT) is used …
DeepRadioID: Real-time channel-resilient optimization of deep learning-based radio fingerprinting algorithms
Radio fingerprinting provides a reliable and energy-efficient IoT authentication strategy by
leveraging the unique hardware-level imperfections imposed on the received wireless …
leveraging the unique hardware-level imperfections imposed on the received wireless …
Deep learning for signal authentication and security in massive internet-of-things systems
A Ferdowsi, W Saad - IEEE Transactions on Communications, 2018 - ieeexplore.ieee.org
Secure signal authentication is arguably one of the most challenging problems in the
Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to …
Internet of Things (IoT), due to the large-scale nature of the system and its susceptibility to …
Generative adversarial networks for distributed intrusion detection in the internet of things
A Ferdowsi, W Saad - 2019 IEEE Global Communications …, 2019 - ieeexplore.ieee.org
To reap the benefits of the Internet of Things (IoT), it is imperative to secure the system
against cyber attacks in order to enable mission critical and real-time applications. To this …
against cyber attacks in order to enable mission critical and real-time applications. To this …
Machine and deep learning for iot security and privacy: applications, challenges, and future directions
The integration of the Internet of Things (IoT) connects a number of intelligent devices with
minimum human interference that can interact with one another. IoT is rapidly emerging in …
minimum human interference that can interact with one another. IoT is rapidly emerging in …
Secure watermarking schemes and their approaches in the IoT technology: an overview
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …
related to the field of data communication where most of the modern studies focus on finding …
Secure and reliable wsn for internet of things: Challenges and enabling technologies
Wireless Sensor Network (WSN) is an innovative technology with a broad range of
applications and highly attractive benefits, such as low cost of implementation and data …
applications and highly attractive benefits, such as low cost of implementation and data …
[HTML][HTML] Internet of robotic things for mobile robots: concepts, technologies, challenges, applications, and future directions
Abstract Nowadays, Multi Robotic System (MRS) consisting of different robot shapes, sizes
and capabilities has received significant attention from researchers and are being deployed …
and capabilities has received significant attention from researchers and are being deployed …
Neural combinatorial deep reinforcement learning for age-optimal joint trajectory and scheduling design in UAV-assisted networks
In this article, an unmanned aerial vehicle (UAV)-assisted wireless network is considered in
which a battery-constrained UAV is assumed to move towards energy-constrained ground …
which a battery-constrained UAV is assumed to move towards energy-constrained ground …
Securing the internet of things and wireless sensor networks via machine learning: A survey
M Mamdouh, MAI Elrukhsi… - … Conference on Computer …, 2018 - ieeexplore.ieee.org
The Internet of Things (IoT) is the network where physical devices, sensors, appliances and
other different objects can communicate with each other without the need for human …
other different objects can communicate with each other without the need for human …