From sample poverty to rich feature learning: A new metric learning method for few-shot classification

L Zhang, Y Lin, X Yang, T Chen, X Cheng… - IEEE Access, 2024 - ieeexplore.ieee.org
With the rapid development of deep learning in the field of computer vision, few-shot
learning has emerged as an effective approach to tackle the challenge of data scarcity …

A Comprehensive Survey on Game Theory Applications in Cyber-Physical System Security: Attack Models, Security Analyses, and Machine Learning Classifications

H Mejdi, S Elmadssia, M Koubaa, T Ezzedine - IEEE Access, 2024 - ieeexplore.ieee.org
The increasing integration of cyber-physical systems (CPS) in critical infrastructures has
heightened the importance of ensuring their security against various cyber threats. Game …

[HTML][HTML] Occlusion Removal in Light-Field Images Using CSPDarknet53 and Bidirectional Feature Pyramid Network: A Multi-Scale Fusion-Based Approach

MF Senussi, HS Kang - Applied Sciences, 2024 - mdpi.com
Occlusion removal in light-field images remains a significant challenge, particularly when
dealing with large occlusions. An architecture based on end-to-end learning is proposed to …

[HTML][HTML] FPGA Realization of an Image Encryption System Using a 16-CPSK Modulation Technique

JC Nuñez-Perez, MA Estudillo-Valdez… - Electronics, 2024 - mdpi.com
Nowadays, M-Quadrature Amplitude Modulation (M-QAM) techniques are widely used to
modulate information by bit packets due to their ability to increase transfer rates. These …

Face privacy protection scheme by security-enhanced encryption structure and nonlinear dynamics

Z Xie, Y Lin, T Liu, H Wen - iScience, 2024 - cell.com
This article proposes a secure communication enhancement scheme based on face
detection and chaotic partition permutation. The scheme uses edge detection technology to …

[HTML][HTML] Efficient Ensemble Adversarial Attack for a Deep Neural Network (DNN)-Based Unmanned Aerial Vehicle (UAV) Vision System

Z Zhang, Q Liu, S Zhou, W Deng, Z Wu, S Qiu - Drones, 2024 - mdpi.com
In recent years, unmanned aerial vehicles (UAVs) vision systems based on deep neural
networks (DNNs) have made remarkable advancements, demonstrating impressive …

[HTML][HTML] A Blockchain-Based Access Control System for Secure and Efficient Hazardous Material Supply Chains

Y Dai, G Lu, Y Huang - Mathematics, 2024 - mdpi.com
With the rapid expansion of global trade, the complexity and diversification of supply chains
have become increasingly significant. In particular, the supply chain for hazardous materials …

Secure image communication based on two-layer dynamic feedback encryption and DWT information hiding

J Zhang, H Wen - Plos one, 2024 - journals.plos.org
In response to the vulnerability of image encryption techniques to chosen plaintext attacks,
this paper proposes a secure image communication scheme based on two-layer dynamic …

[HTML][HTML] Hacking Exposed: Leveraging Google Dorks, Shodan, and Censys for Cyber Attacks and the Defense Against Them

A Alabdulatif, NN Thilakarathne - Computers, 2025 - mdpi.com
In recent years, cyberattacks have increased in sophistication, using a variety of tools to
exploit vulnerabilities across the global digital landscapes. Among the most commonly used …

[HTML][HTML] A Hierarchical Blockchain System for Social Economy Services

YC Chin, CL Hsu, TW Lin, KY Tsai - Electronics, 2024 - mdpi.com
Social economy actors have assisted the recovery from crises by providing innovative
solutions that are aimed at strengthening public services to complement government action …