Analogy among Different Conventional Watermarking Transforms and Noise Removing Filters against Various Attacks

S Zaman, S Ghosh, P Roy, E Karim… - 2021 International …, 2021 - ieeexplore.ieee.org
Nowadays improving lossless data hiding methods is on demand. For this demand, here in
this paper the conventional transforms-Discrete Cosine Transform (DCT), Fast Fourier …

Machine learning techniques to mitigate security attacks in IoT

K Vijayalakshmi - Security and Privacy Issues in Sensor Networks …, 2020 - igi-global.com
Evolving technologies involve numerous IoT-enabled smart devices that are connected 24-7
to the internet. Existing surveys propose there are 6 billion devices on the internet and it will …

[PDF][PDF] Deep Learning based Effective Watermarking Technique for IoT Systems Signal Authentication

M Korde, V Gupta, A Mandloi, S Puntambekar, DS Bais - ijeer.forexjournal.co.in
In order to identify cyber-attacks, this research suggests a special watermarking technique
for dynamic IoT System signal validation. IoT Systems (IoTSs) can extract a group of …

Spectrum Sharing, Latency, and Security in 5G Networks with Application to IoT and Smart Grid

I Parvez - 2018 - digitalcommons.fiu.edu
The surge of mobile devices, such as smartphones, and tables, demands additional
capacity. On the other hand, Internet-of-Things (IoT) and smart grid, which connects …

Підвищення стійкості методу захисту забезпечення автентичності растрових зображень доказової бази від несанкціонованого доступу

БВ Павленко, ДП Присяжний… - … зберігання і обробка …, 2018 - ir.lib.vntu.edu.ua
Запропоновано метод на основі комбінації і модифікації існуючих стеганографічних
методів. Визначено критерії і метрики оцінювання, за якими досліджено його стійкість …

Multi-NFP utilization in the fifth generation and beyond systems

HY ALSheyab - 2021 - knowledgecommons.lakeheadu.ca
Over the past few years, wireless communication needs have experienced continuous
growth. There is now a great demand for more sophisticated infrastructure to cope with the …

Machine Learning-Based Internet-of-Things Security Schemes

DK Sharma, S Pant, M Sharma - IoT Security Paradigms and …, 2020 - taylorfrancis.com
Internet of Things (IoT), an interconnection of devices over the Internet, is one of the biggest
expansions of networks. There has been a rapid growth of the IoT sector in both academia …

Survey On The application of Deep Learning in Internet of Things (IoT)

AM Rahmani, A Rezaee - 2021 - researchsquare.com
Abstract The Internet of Things (IoT) is a network of physical instruments, software, sensors
that all are connected to the Internet. The IoT produces massive data, where, this enormous …

Based Internet-of-Things Security Schemes

DK Sharma, S Pant, M Sharma - IoT Security Paradigms and …, 2020 - books.google.com
The Internet of Things (IoT) has the power to connect billions of smart devices functioning
with minimal human interference. As one of the most rapidly growing domains in the history …

Distributed Machine Learning for Autonomous and Secure Cyber-physical Systems

A Ferdowsi Khosrowshahi - 2020 - vtechworks.lib.vt.edu
Autonomous cyber-physical systems (CPSs) such as autonomous connected vehicles
(ACVs), unmanned aerial vehicles (UAVs), critical infrastructure (CI), and the Internet of …