Enhancing Security of Proof-of-Learning against Spoofing Attacks using Feature-Based Model Watermarking

O Ural, K Yoshigoe - IEEE Access, 2024 - ieeexplore.ieee.org
The rapid advancement of machine learning (ML) technologies necessitates robust security
frameworks to protect the integrity of ML model training processes. Proof-of-Learning (PoL) …

Blockchain-Powered Deep Learning for Internet of Things with Cloud-Assisted Secure Smart Home Networks

FF Alruwaili - IEEE Access, 2024 - ieeexplore.ieee.org
Integrating Internet of Things (IoTs) devices with secure smart home networks assisted by
the cloud signifies a cutting-edge and potent tool for contemporary home automation. This …

BSMACRN: Design of an efficient Blockchain-based Security Model for improving Attack-resilience of Cognitive Radio Ad-hoc Networks

D Dansana, PK Behera, SGK Patro, QN Naveed… - IEEE …, 2024 - ieeexplore.ieee.org
Cognitive Radio Ad-hoc Networks (CRAHNs) are under constant attacks from compromised
primary & secondary nodes. These attacks focus on bandwidth manipulation, internal …

A Secure and Green Cognitive Routing Protocol for Wireless Ad-Hoc Networks

MS Javed, RA Bakar - IEEE Access, 2024 - ieeexplore.ieee.org
The emerging trends in communication and networks focus on integrating versatile facilities
at individual and corporate levels. Network route versatility generates platform dependency …

Design of an Incremental Graph-based Routing Model for enhancing QoS of dense IoMT Networks using Truncated Side chains

R Fuke, R Ranawat - 2024 - researchsquare.com
The exponential growth of Internet of Medical Things (IoMT) has necessitated the need for
an efficient and secure routing mechanism capable of handling dense network traffic while …