Denial of service attacks in edge computing layers: Taxonomy, vulnerabilities, threats and solutions

R Uddin, SAP Kumar, V Chamola - Ad Hoc Networks, 2024 - Elsevier
Edge computing has emerged as the dominant communication technology connecting IoT
and cloud, offering reduced latency and harnessing the potential of edge devices. However …

AI-empowered trajectory anomaly detection for intelligent transportation systems: A hierarchical federated learning approach

X Wang, W Liu, H Lin, J Hu, K Kaur… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
The vigorous development of positioning technology and ubiquitous computing has
spawned trajectory big data. By analyzing and processing the trajectory big data in the form …

A novel blockchain-based deepfake detection method using federated and deep learning models

A Heidari, NJ Navimipour, H Dag, S Talebi… - Cognitive Computation, 2024 - Springer
In recent years, the proliferation of deep learning (DL) techniques has given rise to a
significant challenge in the form of deepfake videos, posing a grave threat to the authenticity …

Vehicle detection and classification via YOLOv8 and deep belief network over aerial image sequences

N Al Mudawi, AM Qureshi, M Abdelhaq, A Alshahrani… - Sustainability, 2023 - mdpi.com
Vehicle detection and classification are the most significant and challenging activities of an
intelligent traffic monitoring system. Traditional methods are highly computationally …

Efficient reinforcement learning-based method for plagiarism detection boosted by a population-based algorithm for pretraining weights

J Xiong, J Yang, L Yan, M Awais, AA Khan… - Expert Systems with …, 2024 - Elsevier
Plagiarism detection (PD) in natural language processing involves locating similar words in
two distinct sources. The paper introduces a new approach to plagiarism detection utilizing …

[HTML][HTML] A novel framework for capacitated SDN controller placement: Balancing latency and reliability with PSO algorithm

GD Singh, V Tripathi, A Dumka, RS Rathore… - Alexandria Engineering …, 2024 - Elsevier
Abstract Software Defined Networking (SDN) is a new network architecture theoretical
framework, which based on the partition of the control plane and the data plane. Some of the …

Generative ai for cyber security: Analyzing the potential of chatgpt, dall-e and other models for enhancing the security space

S Sai, U Yashvardhan, V Chamola, B Sikdar - IEEE Access, 2024 - ieeexplore.ieee.org
This research paper intends to provide real-life applications of Generative AI (GAI) in the
cybersecurity domain. The frequency, sophistication and impact of cyber threats have …

A systematic review on elliptic curve cryptography algorithm for internet of things: Categorization, application areas, and security

AE Adeniyi, RG Jimoh, JB Awotunde - Computers and Electrical …, 2024 - Elsevier
Cyberattacks on the Internet of Things (IoT) may be avoided by implementing cybersecurity
protocols on IoT devices, platform packages, and Internet tools. A significant problem is …

A review of video-based human activity recognition: theory, methods and applications

TFN Bukht, H Rahman, M Shaheen, A Algarni… - Multimedia Tools and …, 2024 - Springer
Video-based human activity recognition (HAR) is an important task in many fields, such as
healthcare monitoring, video surveillance, and sports analysis. This review paper aims to …

Towards improving community detection in complex networks using influential nodes

H Zheng, H Zhao, G Ahmadi - Journal of Complex Networks, 2024 - academic.oup.com
Complex network analysis is inspired by empirical studies of real-world networks such as
computer networks, technology networks and social networks. The analysis of community …