Skip Content
You are currently on the new version of our website. Access the old version .

26 Results Found

  • Article
  • Open Access
7 Citations
4,416 Views
22 Pages

Android Malware Classification Based on Fuzzy Hashing Visualization

  • Horacio Rodriguez-Bazan,
  • Grigori Sidorov and
  • Ponciano Jorge Escamilla-Ambrosio

28 November 2023

The proliferation of Android-based devices has brought about an unprecedented surge in mobile application usage, making the Android ecosystem a prime target for cybercriminals. In this paper, a new method for Android malware classification is propose...

  • Article
  • Open Access
2,003 Views
13 Pages

Slicing Through the Noise: Efficient Crash Deduplication via Trace Reconstruction and Fuzzy Hashing

  • Ling Pang,
  • Cheng Qian,
  • Xiaohui Kuang,
  • Jiuren Qin,
  • Yujie Zang and
  • Jiapeng Zhang

6 December 2024

In contemporary software security testing, fuzzing is a pervasive methodology employed to identify vulnerabilities. However, one of the most significant challenges is the vast number of crash reports, many of which are repetitive, resulting in an inc...

  • Article
  • Open Access
24 Citations
13,207 Views
16 Pages

6 February 2022

Digital evidence is critical in cybercrime investigations because it is used to connect individuals to illegal activity. Digital evidence is complicated, diffuse, volatile, and easily altered, and as such, it must be protected. The Chain of Custody (...

  • Article
  • Open Access
9 Citations
2,482 Views
20 Pages

With the rapid development of the Internet of Things (IoT), ensuring secure communication between devices has become a crucial challenge. This paper proposes a novel secure communication solution by extracting wireless channel state information (CSI)...

  • Article
  • Open Access
4 Citations
3,921 Views
37 Pages

An Improved Bytewise Approximate Matching Algorithm Suitable for Files of Dissimilar Sizes

  • Víctor Gayoso Martínez,
  • Fernando Hernández-Álvarez and
  • Luis Hernández Encinas

2 April 2020

The goal of digital forensics is to recover and investigate pieces of data found on digital devices, analysing in the process their relationship with other fragments of data from the same device or from different ones. Approximate matching functions,...

  • Article
  • Open Access
2 Citations
5,716 Views
18 Pages

MinHash-Based Fuzzy Keyword Search of Encrypted Data across Multiple Cloud Servers

  • Jingsha He,
  • Jianan Wu,
  • Nafei Zhu and
  • Muhammad Salman Pathan

To enhance the efficiency of data searching, most data owners store their data files in different cloud servers in the form of cipher-text. Thus, efficient search using fuzzy keywords becomes a critical issue in such a cloud computing environment. Th...

  • Article
  • Open Access
1 Citations
934 Views
20 Pages

Hash-Based Message Authentication Code with a Reverse Fuzzy Extractor for a CMOS Image Sensor

  • Yuki Rogi,
  • Manami Hagizaki,
  • Tatsuya Oyama,
  • Hiroaki Ogawa,
  • Kota Yoshida,
  • Takeshi Fujino and
  • Shunsuke Okura

The MIPI (Mobile Industry Processor Interface) Alliance provides a security framework for in-vehicle network connections between sensors and processing electronic control units (ECUs). One approach within this framework is data integrity verification...

  • Article
  • Open Access
35 Citations
7,043 Views
38 Pages

30 October 2017

To improve the quality of service and reduce the possibility of security attacks, a secure and efficient user authentication mechanism is required for Wireless Sensor Networks (WSNs) and the Internet of Things (IoT). Session key establishment between...

  • Article
  • Open Access
293 Views
15 Pages

1 December 2025

As a foundational analytical tool, the discernibility matrix plays a pivotal role in the systematic reduction of knowledge in rough set-based systems. Recent advancements in rough set theory have witnessed the proliferation of discernibility matrix-b...

  • Article
  • Open Access
10 Citations
2,680 Views
23 Pages

27 November 2022

Machine-to-machine (M2M) communication is one of the critical technologies of the industrial Internet of Things (IoT), which consists of sensors, actuators at the edge, and servers. In order to solve the security and availability problems regarding c...

  • Article
  • Open Access
4 Citations
2,427 Views
20 Pages

Privacy-Preserving Fine-Grained Redaction with Policy Fuzzy Matching in Blockchain-Based Mobile Crowdsensing

  • Hongchen Guo,
  • Haotian Liang,
  • Mingyang Zhao,
  • Yao Xiao,
  • Tong Wu,
  • Jingfeng Xue and
  • Liehuang Zhu

11 August 2023

The redactable blockchain has emerged as a promising technique in mobile crowdsensing, allowing users to break immutability in a controlled manner selectively. Unfortunately, current fine-grained redactable blockchains suffer two significant limitati...

  • Article
  • Open Access
545 Views
26 Pages

Anonymous and Efficient Chaotic Map-Based Authentication Protocol for Industrial Internet of Things

  • Dake Zeng,
  • Akhtar Badshah,
  • Shanshan Tu,
  • Xin Ai,
  • Hisham Alasmary,
  • Muhammad Waqas and
  • Muhammad Taimoor Khan

18 December 2025

The exponential growth of Internet infrastructure and the widespread adoption of smart sensing devices have empowered industrial personnel to conduct remote, real-time data analysis within the Industrial Internet of Things (IIoT) framework. However,...

  • Article
  • Open Access
1 Citations
1,378 Views
21 Pages

16 December 2024

Searchable encryption (SE) allows users to efficiently retrieve data from encrypted cloud data, but most of the existing SE solutions only support precise keyword search. Fuzzy searchable encryption agrees with practical situations well in the cloud...

  • Article
  • Open Access
2 Citations
2,862 Views
14 Pages

10 March 2020

In the global village era, several competitions require pre-checkups for the participants who are qualified to participate that must be passed before the competition, so the accuracy of the checkup data must be confirmed and must not be leaked or tam...

  • Article
  • Open Access
167 Views
24 Pages

14 January 2026

Underwater wireless sensor networks (UWSNs) are increasingly used in marine monitoring and naval coastal surveillance, where limited bandwidth, long propagation delays, and physically exposed nodes make efficient authentication critical. This paper a...

  • Article
  • Open Access
5 Citations
3,782 Views
17 Pages

While transferring data to cloud servers frees users from having to manage it, it eventually raises new problems, such as data privacy. The concept of searchable encryption has drawn more and more focus in research as a means of resolving the tension...

  • Article
  • Open Access
6 Citations
2,903 Views
23 Pages

Methods to Encrypt and Authenticate Digital Files in Distributed Networks and Zero-Trust Environments

  • Bertrand Cambou,
  • Christopher Philabaum,
  • Jeffrey Hoffstein and
  • Maurice Herlihy

29 May 2023

The methods proposed in this paper are leveraging Challenge–Response–Pair (CRP) mechanisms that are directly using each digital file as a source of randomness. Two use cases are considered: the protection and verification of authenticity...

  • Article
  • Open Access
24 Citations
3,329 Views
17 Pages

Dynamic Hand Gesture Recognition for Smart Lifecare Routines via K-Ary Tree Hashing Classifier

  • Hira Ansar,
  • Amel Ksibi,
  • Ahmad Jalal,
  • Mohammad Shorfuzzaman,
  • Abdulmajeed Alsufyani,
  • Suliman A. Alsuhibany and
  • Jeongmin Park

26 June 2022

In the past few years, home appliances have been influenced by the latest technologies and changes in consumer trends. One of the most desired gadgets of this time is a universal remote control for gestures. Hand gestures are the best way to control...

  • Article
  • Open Access
8 Citations
3,566 Views
24 Pages

A New Design for Alignment-Free Chaffed Cancelable Iris Key Binding Scheme

  • Tong-Yuen Chai,
  • Bok-Min Goi,
  • Yong-Haur Tay and
  • Zhe Jin

1 February 2019

Iris has been found to be unique and consistent over time despite its random nature. Unprotected biometric (iris) template raises concerns in security and privacy, as numerous large-scale iris recognition projects have been deployed worldwide—f...

  • Article
  • Open Access
441 Views
31 Pages

A Blockchain-Based Framework for Secure Healthcare Data Transfer and Disease Diagnosis Using FHM C-Means and LCK-CMS Neural Network

  • Obada Al-Khatib,
  • Ghalia Nassreddine,
  • Amal El Arid,
  • Abeer Elkhouly and
  • Mohamad Nassereddine

9 January 2026

IoT-based blockchain technology has improved the healthcare system to ensure the privacy and security of healthcare data. A Blockchain Bridge (BB) is a tool that enables multiple blockchain networks to communicate with each other. The existing approa...

  • Article
  • Open Access
5 Citations
3,578 Views
26 Pages

Neural Radiance Fields-Based 3D Reconstruction of Power Transmission Lines Using Progressive Motion Sequence Images

  • Yujie Zeng,
  • Jin Lei,
  • Tianming Feng,
  • Xinyan Qin,
  • Bo Li,
  • Yanqi Wang,
  • Dexin Wang and
  • Jie Song

30 November 2023

To address the fuzzy reconstruction effect on distant objects in unbounded scenes and the difficulty in feature matching caused by the thin structure of power lines in images, this paper proposes a novel image-based method for the reconstruction of p...

  • Article
  • Open Access
11 Citations
3,079 Views
20 Pages

12 August 2022

The Internet of Things (IoT) is an integrated environment as it merges physical smart objects to the Internet via wireless technologies to share data. The global connectivity of IoT devices brings the needs to ensure security and privacy for data own...

  • Article
  • Open Access
4 Citations
1,925 Views
21 Pages

A Low-Complexity Security Scheme for Drone Communication Based on PUF and LDPC

  • Jiacheng Zhang,
  • Peng Gu,
  • Zhen Wang,
  • Jun Zou and
  • Guangzu Liu

9 September 2024

Due to the limited payload and power of drones, the computational overhead, storage overhead and communication overhead that can be used for secure communication are restricted, making it difficult to apply some complex but fairly secure authenticati...

  • Article
  • Open Access
25 Citations
3,755 Views
18 Pages

A Lightweight and Practical Anonymous Authentication Protocol Based on Bit-Self-Test PUF

  • Yang An,
  • Yuejiao Zhang,
  • Wenjun Cao,
  • Zhiyan Tong and
  • Zhangqing He

Physical unclonable function (PUF), a cryptographic primitive, has recently been used in protocol design because it can ensure a tamper-evident feature. In many PUF-based protocol schemes, helper data algorithms (HDA) or fuzzy extractors (FE) are use...

  • Article
  • Open Access
4 Citations
3,483 Views
33 Pages

A Comparative Study of Image Descriptors in Recognizing Human Faces Supported by Distributed Platforms

  • Eissa Alreshidi,
  • Rabie A. Ramadan,
  • Md. Haidar Sharif,
  • Omer Faruk Ince and
  • Ibrahim Furkan Ince

Face recognition is one of the emergent technologies that has been used in many applications. It is a process of labeling pictures, especially those with human faces. One of the critical applications of face recognition is security monitoring, where...

  • Article
  • Open Access
411 Views
29 Pages

29 December 2025

The rapid convergence of artificial intelligence (AI), cloud computing, and 5G communication has positioned extended reality (XR) as a core technology bridging the physical and virtual worlds. Encompassing virtual reality (VR), augmented reality (AR)...