Digital watermarking of compressed videos using larger dimension 2D error correcting codes for higher embedding capacity

A Rodrigues, A Bhise - International Journal of Electronic …, 2021 - inderscienceonline.com
This paper proposes a novel method of digital watermarking of MPEG videos using 2-
dimensional error-correcting codes (2D ECC). The motion vectors of the video to be …

Recent Trends and Advances in Deep Learning-Based Internet of Things

D Kaur, G Kaur, G Kaur - Smart Computing and Self-Adaptive …, 2021 - taylorfrancis.com
The Internet of Things (IoT) is becoming a common term and ample numbers of smart
products are now available which use sensors, microcontrollers, or other kinds of …

Authentication of everything in the Internet of Things: Learning and environmental effects

YS Dabbagh, W Saad - arXiv preprint arXiv:1805.00969, 2018 - arxiv.org
Reaping the benefits of the Internet of things (IoT) system is contingent upon developing IoT-
specific security solutions. Conventional security and authentication solutions often fail to …

[PDF][PDF] Security of IoT: AES and the Lorenz System

L Kamel - 2022 - researchgate.net
Internet of things is a unique, related, large network that gathers data that a human cannot
do easily, by applying sensors. It connects the environment with the user. Nowadays, the …

Adaptive Supervisory Framework for Cyber-Physical Systems-Optimal Scheduling of Smart Home Appliances

JPBGP Leitão - 2022 - estudogeral.uc.pt
Throughout the 21st century, technology has advanced at exponential speed, spreading into
our daily routines and becoming critical in almost any everyday life domain. The resulting …

[图书][B] Composing Human-Machine Alignment to Secure and Design Artificial Computer Learning

W Garcia - 2022 - search.proquest.com
Recent years have witnessed the widespread deployment of computer systems capable of
human-inspired artificial learning, enabling modern learning systems to match or surpass …

[PDF][PDF] Secure Watermarking Schemes and Their Approaches in the IoT Technology: An Overview. Electronics 2021, 10, 1744

R Wazirali, R Ahmad, A Al-Amayreh, M Al-Madi… - 2021 - academia.edu
Information security is considered one of the most important issues in various infrastructures
related to the field of data communication where most of the modern studies focus on finding …

Innovative Approach for Optimized IoT Security Based on Spatial Network Voronoï Diagrams, Network Centrality, and ML-enabled Blockchain

A Mabrouk - Blockchain and Machine Learning for IoT Security - taylorfrancis.com
This article delves into the security challenges faced by the Internet of Things (IoT) and puts
forth a fresh strategy to enhance IoT network security. Our strategy leverages spatial network …

[图书][B] Intelligent Node-Overload Protection in Mobile Edge Computing Using Reinforcement Learning

A Jitani - 2021 - search.proquest.com
Abstract Mobile Edge Computing (MEC) refers to the concept of placing computational
capability and applications at the edge of the network. Running applications and …

[PDF][PDF] Smart Grid Cyber-Physical Attack and Defense: A

H ZHANG, BO LIU, H WU - ieeexplore.ieee.org
ecent advances in the cyber-physical smart grid (CPSG) have enabled a broad range of new
devices based on the information and communication technology (ICT). However, these ICT …