Zobrazeno 1 - 10
of 171
pro vyhledávání: '"Inkyu Moon"'
Publikováno v:
Mathematics, Vol 12, Iss 13, p 1936 (2024)
In this paper, we perform neural cryptanalysis on five block ciphers: Data Encryption Standard (DES), Simplified DES (SDES), Advanced Encryption Standard (AES), Simplified AES (SAES), and SPECK. The block ciphers are investigated on three different d
Externí odkaz:
https://doaj.org/article/2f22e56cdb674af791aa8c9854ca1e7c
Publikováno v:
Biomedicines, Vol 11, Iss 12, p 3200 (2023)
The enlargement of the prostate gland in the reproductive system of males is considered a form of prostate cancer (PrC). The survival rate is considerably improved with earlier diagnosis of cancer; thus, timely intervention should be administered. In
Externí odkaz:
https://doaj.org/article/9a093bd874b3463cb5f43bc330c7f3fd
Publikováno v:
IEEE Access, Vol 10, Pp 3228-3237 (2022)
Long Short-Term Memory (LSTM) and Gated Recurrent Units (GRU) are a class of Recurrent Neural Networks (RNN) suitable for sequential data processing. Bidirectional LSTM (BLSTM) enables a better understanding of context by learning the future time ste
Externí odkaz:
https://doaj.org/article/5b97819f86ce437dba9f1515246ec180
Publikováno v:
Advanced Photonics Research, Vol 4, Iss 1, Pp n/a-n/a (2023)
Image‐based stain‐free elliptical cancer cell classification is very challenging due to interclass morphological similarity. Herein, the classification of three types of cancer cell lines (lung, breast, and skin) by feature‐based machine learni
Externí odkaz:
https://doaj.org/article/2bc1ba72a2ee45a49bda46df814dcb93
Publikováno v:
Cryptography, Vol 7, Iss 3, p 35 (2023)
Cryptanalysis has been studied and gradually improved with the evolution of cryptosystems over past decades. Recently, deep learning (DL) has started to be used in cryptanalysis to attack digital cryptosystems. As computing power keeps growing, deplo
Externí odkaz:
https://doaj.org/article/b668705a5f4c43da86f08fb1d89f690a
Publikováno v:
IEEE Access, Vol 9, Pp 136126-136134 (2021)
With the emergence of cloud computing, large amounts of private data are stored and processed in the cloud. On the other hand, data owners (users) may not want to reveal data information to cloud providers to protect their privacy. Therefore, users m
Externí odkaz:
https://doaj.org/article/4eabc6c8526a4944ba548e50740bb782
Publikováno v:
IEEE Access, Vol 9, Pp 60960-60970 (2021)
Information security has become an intrinsic part of data communication. Cryptanalysis using deep learning–based methods to identify weaknesses in ciphers has not been thoroughly studied. Recently, long short-term memory (LSTM) networks have shown
Externí odkaz:
https://doaj.org/article/f2569061de514b439bf47379381ae840
Publikováno v:
Mathematics, Vol 10, Iss 16, p 2859 (2022)
Cloud storage has become eminent, with an increasing amount of data being produced daily; this has led to substantial concerns related to privacy and unauthorized access. To secure privacy, users can protect their private data by uploading encrypted
Externí odkaz:
https://doaj.org/article/3bae63ef046e4b2b829a29339734e322
Publikováno v:
IEEE Access, Vol 6, Pp 70113-70121 (2018)
We present a new image-authentication algorithm based on binary-quantified double random-phase encoding (DRPE) and a discrete cosine transformation (DCT) domain watermarking scheme. The image is encrypted using a DRPE scheme, in which only the phase
Externí odkaz:
https://doaj.org/article/fab0ee1e97cc481993e4731dbd7c11f5
Publikováno v:
Sensors, Vol 14, Iss 5, Pp 8877-8894 (2014)
In this paper, we propose a new method for color image-based authentication that combines multispectral photon-counting imaging (MPCI) and double random phase encoding (DRPE) schemes. The sparsely distributed information from MPCI and the stationary
Externí odkaz:
https://doaj.org/article/0f7deab31e1945acb30755ccb21cd3a5