Revolutionizing intrusion detection in industrial IoT with distributed learning and deep generative techniques

D Hamouda, MA Ferrag, N Benhamida, H Seridi… - Internet of Things, 2024 - Elsevier
In response to escalating cyber threats and privacy issues within the Industrial Internet of
Things (IIoT), this research presents FedGenID, an advanced Federated Generative …

An optimized meta‐heuristic clustering‐based routing scheme for secured wireless sensor networks

G Kiran Kumar, SK Prashanth… - International Journal …, 2024 - Wiley Online Library
Privacy and security present significant challenges in wireless sensor networks (WSNs). In
order to enhance security, the sensor network is equipped with high throughput. While the …

Advancement and Development of Graph-Based Reasoning Method for Human Malicious Behaviors Identification Based on Graph Contrastive Representation …

Z Li, X Song, S Chen, K Demachi - Available at SSRN 4798853 - papers.ssrn.com
This paper mainly aims to solve the problem of human malicious behaviors identification in
nuclear security, which features of extremely high potential hazards and unique judgement …

[引用][C] Deep Siamese domain adaptation convolutional Neural Network optimized with Honey Badger Algorithm for Fetal Arrhythmia Detection and Classification from …

J Thapasimuthan, S Thirumaaran - International Journal of Pattern …, 2024 - World Scientific
Deep learning classification is commonly used to assess the biomedical data. The analysis
of fetal heart rate (FHR) signals data monitor the health of both the mother and the foetus …