Ensuring the confidentiality of transmitting sensitive image data is paramount. Cryptography recreates a critical function in safeguarding information from potential risks and confirming …
Data centres have become the backbone of infrastructure for delivering cloud services. In the emerging cloud computing paradigm, virtual machine (VM) live migration involves …
S Peng, Y Wang, A Tang, Y Jiang, J Kan, M Pecht - Energy, 2024 - Elsevier
Accurate estimation of the state of health (SOH) of lithium-ion batteries is crucial for the safety and operation of electric vehicles. The accuracy and efficiency of SOH estimation are …
Z Zhang, S Luo, Y Lu, L Pan - Information Fusion, 2024 - Elsevier
Abstract Third-Party Library (TPL) detection is a crucial aspect of Android application security assessment, but it faces significant challenges due to code obfuscation. Existing …
This paper introduces an innovative self-reversible image encryption algorithm designed to optimize resource utilization and enhance the efficiency of managing encryption and …
M Zhao, L Li, Z Yuan - Chaos, Solitons & Fractals, 2024 - Elsevier
At present, multi-image encryption schemes usually require the type, quantity and size of images to be fixed, and there are many restrictions. Therefore, this paper proposes a multi …
The domain of Mobile Edge Computing (MEC) has seen rapid growth, making consumer behavior research an essential element in many applications. Nevertheless, in MEC …
Q Sheng, C Fu, Z Lin, J Chen, X Wang… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Existing High Efficiency Video Coding (HEVC) selective encryption algorithms only consider the encoding characteristics of syntax elements to keep format compliance, but ignore the …
Data security and privacy have become essential due to the increasingly advanced interconnectivity in today's world, hence the reliance on cryptography. This paper introduces …