H Mejdi, S Elmadssia, M Koubaa, T Ezzedine - IEEE Access, 2024 - ieeexplore.ieee.org
The increasing integration of cyber-physical systems (CPS) in critical infrastructures has heightened the importance of ensuring their security against various cyber threats. Game …
Occlusion removal in light-field images remains a significant challenge, particularly when dealing with large occlusions. An architecture based on end-to-end learning is proposed to …
Nowadays, M-Quadrature Amplitude Modulation (M-QAM) techniques are widely used to modulate information by bit packets due to their ability to increase transfer rates. These …
This article proposes a secure communication enhancement scheme based on face detection and chaotic partition permutation. The scheme uses edge detection technology to …
Z Zhang, Q Liu, S Zhou, W Deng, Z Wu, S Qiu - Drones, 2024 - mdpi.com
In recent years, unmanned aerial vehicles (UAVs) vision systems based on deep neural networks (DNNs) have made remarkable advancements, demonstrating impressive …
Y Dai, G Lu, Y Huang - Mathematics, 2024 - mdpi.com
With the rapid expansion of global trade, the complexity and diversification of supply chains have become increasingly significant. In particular, the supply chain for hazardous materials …
J Zhang, H Wen - Plos one, 2024 - journals.plos.org
In response to the vulnerability of image encryption techniques to chosen plaintext attacks, this paper proposes a secure image communication scheme based on two-layer dynamic …
In recent years, cyberattacks have increased in sophistication, using a variety of tools to exploit vulnerabilities across the global digital landscapes. Among the most commonly used …
Social economy actors have assisted the recovery from crises by providing innovative solutions that are aimed at strengthening public services to complement government action …