Computational sensor fingerprints
Analysis of imaging sensors is one of the most reliable photo forensic techniques, but it is
increasingly challenged by complex image processing in modern cameras. The underlying …
increasingly challenged by complex image processing in modern cameras. The underlying …
[HTML][HTML] An effective digital audio watermarking using a deep convolutional neural network with a search location optimization algorithm for improvement in …
AJ Patil, R Shelke - High-Confidence Computing, 2023 - Elsevier
Watermarking is the advanced technology utilized to secure digital data by integrating
ownership or copyright protection. Most of the traditional extracting processes in audio …
ownership or copyright protection. Most of the traditional extracting processes in audio …
When AI Eats Itself: On the Caveats of Data Pollution in the Era of Generative AI
Generative artificial intelligence (AI) technologies and large models are producing realistic
outputs across various domains, such as images, text, speech, and music. Creating these …
outputs across various domains, such as images, text, speech, and music. Creating these …
[HTML][HTML] A Security Information Transmission Method Based on DHR for Seafloor Observation Network
F Ying, S Zhao, J Wang - Sensors, 2024 - mdpi.com
A seafloor observation network (SON) consists of a large number of heterogeneous devices
that monitor the deep sea and communicate with onshore data centers. Due to the long …
that monitor the deep sea and communicate with onshore data centers. Due to the long …
Colonel blotto game for secure state estimation in interdependent critical infrastructure
Securing the physical components of a city's interdependent critical infrastructure (ICI) such
as power, natural gas, and water systems is a challenging task due to their interdependence …
as power, natural gas, and water systems is a challenging task due to their interdependence …
A software/hardware secure watermarking scheme for Internet of Things applications
R Dalbouchi, A Zitouni - Multimedia Tools and Applications, 2023 - Springer
The security of applications that run over limited resources such as the Internet of Things
becomes a new challenge for researchers. Digital watermarking (WM) is among the …
becomes a new challenge for researchers. Digital watermarking (WM) is among the …
AI-assisted authentication: state of the art, taxonomy and future roadmap
G Zhu, Y Al-Qaraghuli - arXiv preprint arXiv:2204.12492, 2022 - arxiv.org
Artificial Intelligence (AI) has found its applications in a variety of environments ranging from
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …
data science to cybersecurity. AI helps break through the limitations of traditional algorithms …
[PDF][PDF] Deep Learning and Industrial Internet Security: Applications and Challenges [J]
Industrial Internet security is crucial for strengthening the manufacturing and network sectors
of China. Deep learning, owing to its strong expression ability, good adaptability, and high …
of China. Deep learning, owing to its strong expression ability, good adaptability, and high …
IoT and machine learning-a technological combination for smart application
J Arora - Proceedings of the 4th International Conference …, 2020 - papers.ssrn.com
With the rapid developments in hardware, software and communication technologies, a new
era of internet connected sensory devices has begun which provides a link between …
era of internet connected sensory devices has begun which provides a link between …
[PDF][PDF] A Comprehensive Review of Fault Tolerant and Resilient Cyber-Secure strategies for Critical Infrastructure Protection
A Mohammed, F Muddeen, CJ Ramlal… - The Industrial …, 2022 - researchgate.net
This paper reviews current methods being used to maintain resilient cyber-secure and fault
tolerant critical infrastructure (CI). Two main categories have been presented from a control …
tolerant critical infrastructure (CI). Two main categories have been presented from a control …