过去一年中添加的文章,按日期排序

An Intelligent Intrusion Detection using Rule-based CNN with PSO Optimizer

P Karpurasundharapondian, M Selvi… - … Artificial Intelligence …, 2024 - ieeexplore.ieee.org
68 天前 - … coming from malicious nodes using the detection and … detection using dynamic
feature selection and fuzzy temporal decision tree classification for wireless sensor networks,” …

Discrimination of primary user emulation attack on cognitive radio networks using machine learning based spectrum sensing scheme

C Ambhika - Wireless Networks, 2024 - Springer
100 天前 - … the spectrum sensing mechanism. The presented approach integrates the SVM
with the Bayesian optimization algorithm (BOA) in which SVM aims to detect the malicious user …

Fake Clones for Adversaries Detection with Efficient Relay Selection in MWSN

P Deepalakshmi, T Kumanan - … on Device Intelligence …, 2024 - ieeexplore.ieee.org
117 天前 - … misbehavior in Wireless Sensor Networks (WSNs) [6]. In … The watchdog method
uses malicious node detection to … SCSO chooses the optimal forwarder based on node energy, …

Validation of IoT Networks in Precision Agriculture

J Seth, MS Reddy, AK Pandey - … on Artificial Intelligence and …, 2024 - ieeexplore.ieee.org
117 天前 - … Logeshwaran, "An intelligent optimization framework to predict the vulnerable
range of tumor cells using Internet of things," 2023 IEEE 2nd International Conference on …

ANN-Based Intelligent Secure Routing Protocol in Vehicular Ad Hoc Networks (VANETs) Using Enhanced AODV

M ul Hassan, AA Al-Awady, A Ali, Sifatullah, M Akram… - Sensors, 2024 - mdpi.com
166 天前 - … classifiers in pursuing malicious node detection. These … optimizing communication
paths, detecting and handling … in heterogeneous wireless sensor networks was improved. …

Fuzzy and Spiking Neural Network-based Secure Data Exchange Framework for Autonomous Vehicle

N Patel, D Patel, NK Jadav, S Tanwar… - 2024 14th International …, 2024 - ieeexplore.ieee.org
174 天前 - … However, the reliance on sensor networks for operational … (CAVs) trained to artificial
intelligence(AI) models and … to not only detect malicious nodes within the network but also …

Artificial Intelligence-Based Intrusion Detection and Prevention in Edge-Assisted SDWSN With Modified Honeycomb Structure

J Kipongo, TG Swart, E Esenogho - IEEE access, 2023 - ieeexplore.ieee.org
195 天前 - … The latter detects malicious nodes using a driver training-based optimization (DTO) …
Wireless sensor network (WSN) is a group of sensors placed at various locations that …

FedOnion: FL and Onion Routing-Driven Secure Data Exchange Framework for 5G-IIoT Applications

NK Jadav, R Gupta, P Bhattacharya… - … 2023-2023 IEEE …, 2023 - ieeexplore.ieee.org
219 天前 - artificial intelligence (AI) at its core operations, IIoT ecosystems can extract meaningful
insights from shared data among nodes, … clients and sends the optimized weights back to …

A New Hybrid EAES-SI Framework for Secure Information Sharing iin WBANS

P Anitha, R Priya - 2023 7th International Conference on …, 2023 - ieeexplore.ieee.org
231 天前 - … Next, a "Swarm Intelligence (SI)" approach is proposed, depicted upon the … by
using the EAES algorithm, then for energy efficiency, the optimal path was selected using the SI …

Poisoning Detection in Federated Learning System: An Adaptive Approach

A Cheng, L Qi, L Lv, S Gao, Z Li - … and Networking (ICN), 2023 - ieeexplore.ieee.org
243 天前 - optimizer to adjust the weight ratio of the two detection methods to improve the
stability of the entire detection … aggregation caused by the malicious node sending the wrong …