Skip to main content

Peer-to-Peer Networking and Applications

Ausgabe 5/2024

Inhalt (48 Artikel)

Small target disease detection based on YOLOv5 framework for intelligent bridges

Tingping Zhang, Yuanjun Xiong, Shixin Jiang, Pingxi Dan, Guan Gui

Advancing IoT security: a comprehensive AI-based trust framework for intrusion detection

Chandra Prabha Kaliappan, Kanmani Palaniappan, Devipriya Ananthavadivel, Ushasukhanya Subramanian

Feature fusion federated learning for privacy-aware indoor localization

Omid Tasbaz, Bahar Farahani, Vahideh Moghtadaiee

Advancing security and efficiency in MANET using dynamic algorithm switching

M. Vijay Anand, Anand Krishnamurthy, Karuppiah Subramanian, Saravanan Raju

IoT in energy: a comprehensive review of technologies, applications, and future directions

Oroos Arshi, Akanksha Rai, Gauri Gupta, Jitendra Kumar Pandey, Surajit Mondal

A blockchain-based auditable deduplication scheme for multi-cloud storage

Chunhua Jin, Yongliang Xu, Wenyu Qin, Jie Zhao, Ge Kan, Fugeng Zeng

RAB: A lightweight block cipher algorithm with variable key length

Xing Zhang, Min Yang, Jian Chen, Tianning Li, Changda Wang

A secure user authentication scheme for crypto-wallet in IoT environment

Toan-Thinh Truong, Minh-Triet Tran, Anh-Duc Duong

A secure location management scheme in an LEO-satellite network with dual-mobility

Qinglei Kong, Yifan Wang, Maode Ma, Xiaodong Qu, Haiyong Bao

Resilient enhancements of routing protocols in MANET

  • Open Access

Maros Baumgartner, Jan Papaj, Natalia Kurkina, Lubomir Dobos, Anton Cizmar

A smart contract vulnerability detection method based on deep learning with opcode sequences

Peiqiang Li, Guojun Wang, Xiaofei Xing, Jinyao Zhu, Wanyi Gu, Guangxin Zhai

An integrated MCDM-based charging scheduling in a WRSN with multiple MCs

Man Gun Ri, Il Gwang Kim, Se Hun Pak, Nam Jun Jong, Song Jo Kim

Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection

Tae hoon Kim, Moez Krichen, Meznah A. Alamro, Alaeddine Mihoub, Gabriel Avelino Sampedro, Sidra Abbas

A hierarchical hybrid intrusion detection model for industrial internet of things

Zhendong Wang, Xin Yang, Zhiyuan Zeng, Daojing He, Sammy Chan

Proxy re-signature scheme with cryptographic reverse firewall for medical data security

Xiaodong Yang, Lizhen Wei, Songyu Li, Xiaoni Du, Caifen Wang

Enhancing paillier to fully homomorphic encryption with semi-honest TEE

Yunyi Fang, Xiaopeng Yang, Hui Zhu, Wei Xu, Yandong Zheng, Xingdong Liu, Dong Zhang

Temporary relay: A more flexible way to cross chains

Haonan Wang, Jingyu Wang, Lixin Liu, Yu Lu

Correction to: Certificate-less Aggregate Signature Authentication Scheme (CLASAS) for secure and efficient data transmission in Wireless Sensor Networks (WSNs)

  • Correction

Pradeep Radhakrishnan, Praveen Kumar Sugumar, Preethi Ponnan, Gopirajan Punniyakotti Varadharajan