Abstract: High resolution images containing personal information are often stored in semi trusted cloud platforms such as Baidu Cloud Drive. Encrypting them first and then uploading to the cloud can ...
Abstract: The Internet of Things (IoT) is growing rapidly, enabling interconnected devices to communicate and share data seamlessly. While this expansion drives significant advancements across ...
Abstract: Automated guided vehicles are widely utilized in the real production environment for tasks such as job transfer and inter-factory collaboration, yet they remain relatively underexplored in ...
Abstract: The spatio-temporal fusion technology can effectively solve the problem of missing time series data. However, existing algorithms often struggle to accurately capture surface feature changes ...
Abstract: This article analyzes the security performance of an image encryption algorithm based on a 3-D Boolean convolutional neural network (CNN). The algorithm utilizes the convolutional layers of ...
Abstract: This paper focuses on various encryption approaches to cope with different network attacks on IoT devices and a quality analysis of them has been performed. Currently network attacks such as ...
Abstract: This research study proposes a secure application framework by utilizing encryption technology appropriate to the sensitive content of the journalistic work. It employs multi-roles of ...
Abstract: This work presents an efficient and secure video encryption algorithm that utilizes a newly designed one-dimensional sine-cubic chaotic map. The 1D sine-cubic chaotic map (SCCM) is developed ...
Abstract: Power-split hybrid transmissions have been widely used in the automotive industry. Among them, two-mode powersplit hybrid transmissions can be adapted to a more variety of vehicles. Its ...
THE PROMISE at the heart of the artificial-intelligence (AI) boom is that programming a computer is no longer an arcane skill: a chatbot or large language model (LLM) can be instructed in simple ...