Differential privacy techniques for cyber physical systems: A survey

MU Hassan, MH Rehmani… - … Communications Surveys & …, 2019 - ieeexplore.ieee.org
Modern cyber physical systems (CPSs) has widely being used in our daily lives because of
development of information and communication technologies (ICT). With the provision of …

A comprehensive review on image encryption techniques

M Kaur, V Kumar - Archives of Computational Methods in Engineering, 2020 - Springer
Image encryption techniques play a significant role in multimedia applications to secure and
authenticate digital images. This paper presents a comprehensive study of various image …

Deep learning for multigrade brain tumor classification in smart healthcare systems: A prospective survey

K Muhammad, S Khan, J Del Ser… - … on Neural Networks …, 2020 - ieeexplore.ieee.org
Brain tumor is one of the most dangerous cancers in people of all ages, and its grade
recognition is a challenging problem for radiologists in health monitoring and automated …

Secured IIoT against trust deficit-A flexi cryptic approach

VM Padmapriya, K Thenmozhi, M Hemalatha… - Multimedia Tools and …, 2024 - Springer
This research allows the secure surveillance approach for the Internet of Things (IoT)
methodology to be developed by integrating wireless signalling and image encryption …

Convolutional neural networks based fire detection in surveillance videos

K Muhammad, J Ahmad, I Mehmood, S Rho… - Ieee …, 2018 - ieeexplore.ieee.org
The recent advances in embedded processing have enabled the vision based systems to
detect fire during surveillance using convolutional neural networks (CNNs). However, such …

Efficient deep CNN-based fire detection and localization in video surveillance applications

K Muhammad, J Ahmad, Z Lv… - … on Systems, Man …, 2018 - ieeexplore.ieee.org
Convolutional neural networks (CNNs) have yielded state-of-the-art performance in image
classification and other computer vision tasks. Their application in fire detection systems will …

A decentralized lightweight blockchain-based authentication mechanism for IoT systems

U Khalid, M Asim, T Baker, PCK Hung, MA Tariq… - Cluster …, 2020 - Springer
Abstract The Internet of Things (IoT) is an emerging paradigm branded by heterogeneous
technologies composed of smart ubiquitous objects that are seamlessly connected to the …

Spatiotemporal anomaly detection using deep learning for real-time video surveillance

R Nawaratne, D Alahakoon… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
Rapid developments in urbanization and autonomous industrial environments have
augmented and expedited the need for intelligent real-time video surveillance. Recent …

Asynchronous updating Boolean network encryption algorithm

S Gao, R Wu, X Wang, J Liu, Q Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
An asynchronous updating Boolean network is employed to simulate and analyze the gene
expression of a particular tissue or species, revealing the life activity process from a system …

Efficient fire detection for uncertain surveillance environment

K Muhammad, S Khan, M Elhoseny… - IEEE Transactions …, 2019 - ieeexplore.ieee.org
Tactile Internet can combine multiple technologies by enabling intelligence via mobile edge
computing and data transmission over a 5G network. Recently, several convolutional neural …