首页 > 最新文献

Transactions on Emerging Telecommunications Technologies最新文献

英文 中文
FT-HT: A Fine-Tuned VGG16-Based and Hashing Framework for Secure Multimodal Biometric System FT-HT:一种基于vgg16和哈希的安全多模态生物识别框架
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1002/ett.70142
Seema Rani, Neeraj Mohan, Priyanka Kaushal

Multimodal biometric systems offer several advantages over unimodal systems, including a lower error rate, greater accuracy and broader coverage of residents. However, the multimodal systems need to store multiple biometric traits associated with each user, which brings a higher need for integrity and privacy. This study describes a deep learning (DL) model for a feature-level coalition that utilizes the biographical data of the user's face and iris to create a secure multimodal template. To create a reliable, unique multimodal shareable latent image, a deep hashing (linearization) approach is used for the fusion architecture. Furthermore, a hybrid secure architecture that fuses secure sketching techniques with erasable biometric features and integrates them into a complete security framework is used in this work. The efficiency of the recommended method is demonstrated using the face and iris images from the multimodal database. The proposed method provides the ability to delete templates and better protect the biometric data. This method works with the “WVU” multimodal data store and the “hashing” method for “image retrieval.” The proposed improved VGG16 achieves a data accuracy of 99.85. The paper also provides information on the techniques for structuring modalities such as iris and face using deep hashing, multimodal fusion and biometric security techniques. However, further studies are needed to extend the proposed framework to other unrestricted biometric aspects.

多式联运生物识别系统比单式联运系统有几个优势,包括错误率更低、准确性更高、居民覆盖范围更广。然而,多模式系统需要存储与每个用户相关的多个生物特征,这对完整性和隐私性提出了更高的要求。本研究描述了一个特征级联盟的深度学习(DL)模型,该模型利用用户面部和虹膜的传记数据来创建一个安全的多模态模板。为了创建可靠、独特的多模态可共享潜在图像,融合架构采用了深度哈希(线性化)方法。此外,混合安全架构融合了安全素描技术和可擦除的生物特征,并将它们集成到一个完整的安全框架中。使用多模态数据库中的人脸和虹膜图像验证了所推荐方法的有效性。该方法提供了删除模板和更好地保护生物特征数据的能力。该方法与“WVU”多模态数据存储和“图像检索”的“哈希”方法一起工作。改进后的VGG16的数据精度达到99.85。本文还提供了使用深度哈希、多模态融合和生物识别安全技术构建虹膜和面部等模态的技术信息。然而,需要进一步的研究将提出的框架扩展到其他不受限制的生物识别方面。
{"title":"FT-HT: A Fine-Tuned VGG16-Based and Hashing Framework for Secure Multimodal Biometric System","authors":"Seema Rani,&nbsp;Neeraj Mohan,&nbsp;Priyanka Kaushal","doi":"10.1002/ett.70142","DOIUrl":"https://doi.org/10.1002/ett.70142","url":null,"abstract":"<div>\u0000 \u0000 <p>Multimodal biometric systems offer several advantages over unimodal systems, including a lower error rate, greater accuracy and broader coverage of residents. However, the multimodal systems need to store multiple biometric traits associated with each user, which brings a higher need for integrity and privacy. This study describes a deep learning (DL) model for a feature-level coalition that utilizes the biographical data of the user's face and iris to create a secure multimodal template. To create a reliable, unique multimodal shareable latent image, a deep hashing (linearization) approach is used for the fusion architecture. Furthermore, a hybrid secure architecture that fuses secure sketching techniques with erasable biometric features and integrates them into a complete security framework is used in this work. The efficiency of the recommended method is demonstrated using the face and iris images from the multimodal database. The proposed method provides the ability to delete templates and better protect the biometric data. This method works with the “WVU” multimodal data store and the “hashing” method for “image retrieval.” The proposed improved VGG16 achieves a data accuracy of 99.85. The paper also provides information on the techniques for structuring modalities such as iris and face using deep hashing, multimodal fusion and biometric security techniques. However, further studies are needed to extend the proposed framework to other unrestricted biometric aspects.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865804","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater Delay Estimation Based on Adaptive Singular Value Decomposition Reconstruction Under Low SNR and Multipath Conditions 低信噪比多径条件下基于自适应奇异值分解重构的水下时延估计
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1002/ett.70145
Juan Li, Xiaoyan Zhou, Xuerong Cui, Meiqi Ji, Lei Li, Bin Jiang, Shibao Li, Jianhang Liu

Delay estimation aims to determine the distance between the signal source and the receiver by measuring the signal's arriving time, which is crucial for underwater positioning. Traditional delay estimation algorithms, such as Generalized Cross-Correlation (GCC), often perform poorly in low signal-to-noise ratio (SNR) or multipath channels. In response to this issue, this paper proposes an algorithm based on adaptive Singular Value Decomposition Reconstruction (SVDR). This method initially requires obtaining the cross-power spectrum between the transmitted and received signals. Subsequently, the inter-correlation results at different frequency bands are assembled into a Frequency-Sliding Generalized Cross-Correlation (FSGCC) matrix. Then, Singular Value Decomposition Reconstruction (SVDR) is applied to extract crucial delay information from the matrix, aiming to alleviate the impact of noise and multipath effects on delay estimation. However, the selection of singular values during the reconstruction process directly influences the degree of noise reduction in the signal. Therefore, this manuscript further calculates the matrix represented by each singular value obtained from the SVD operation. The similarity between each matrix and the low-noise FSGCC matrix is computed to select the most suitable singular values to retain. Through simulation experiments, this algorithm can overcome the influence of the multipath effects and achieve better delay estimation results compared to traditional GCC and SVD algorithms, and validates its effectiveness in low SNR multipath underwater acoustic channels.

延迟估计旨在通过测量信号的到达时间来确定信号源与接收器之间的距离,这对水下定位至关重要。传统的延迟估计算法,如广义交叉相关(GCC),在低信噪比(SNR)或多径信道中往往表现不佳。针对这一问题,本文提出了一种基于自适应奇异值分解重构(SVDR)的算法。这种方法首先需要获得发射信号和接收信号之间的交叉功率谱。随后,将不同频段的相互关联结果组合成频率滑动广义交叉相关(FSGCC)矩阵。然后,应用奇异值分解重构(SVDR)从矩阵中提取关键的延迟信息,以减轻噪声和多径效应对延迟估计的影响。然而,重构过程中奇异值的选择直接影响信号的降噪程度。因此,本文进一步计算了 SVD 运算得到的每个奇异值所代表的矩阵。计算每个矩阵与低噪声 FSGCC 矩阵之间的相似度,从而选择最适合保留的奇异值。通过仿真实验,与传统的 GCC 算法和 SVD 算法相比,该算法可以克服多径效应的影响,获得更好的延迟估计结果,并验证了其在低信噪比多径水下声学信道中的有效性。
{"title":"Underwater Delay Estimation Based on Adaptive Singular Value Decomposition Reconstruction Under Low SNR and Multipath Conditions","authors":"Juan Li,&nbsp;Xiaoyan Zhou,&nbsp;Xuerong Cui,&nbsp;Meiqi Ji,&nbsp;Lei Li,&nbsp;Bin Jiang,&nbsp;Shibao Li,&nbsp;Jianhang Liu","doi":"10.1002/ett.70145","DOIUrl":"https://doi.org/10.1002/ett.70145","url":null,"abstract":"<div>\u0000 \u0000 <p>Delay estimation aims to determine the distance between the signal source and the receiver by measuring the signal's arriving time, which is crucial for underwater positioning. Traditional delay estimation algorithms, such as Generalized Cross-Correlation (GCC), often perform poorly in low signal-to-noise ratio (SNR) or multipath channels. In response to this issue, this paper proposes an algorithm based on adaptive Singular Value Decomposition Reconstruction (SVDR). This method initially requires obtaining the cross-power spectrum between the transmitted and received signals. Subsequently, the inter-correlation results at different frequency bands are assembled into a Frequency-Sliding Generalized Cross-Correlation (FSGCC) matrix. Then, Singular Value Decomposition Reconstruction (SVDR) is applied to extract crucial delay information from the matrix, aiming to alleviate the impact of noise and multipath effects on delay estimation. However, the selection of singular values during the reconstruction process directly influences the degree of noise reduction in the signal. Therefore, this manuscript further calculates the matrix represented by each singular value obtained from the SVD operation. The similarity between each matrix and the low-noise FSGCC matrix is computed to select the most suitable singular values to retain. Through simulation experiments, this algorithm can overcome the influence of the multipath effects and achieve better delay estimation results compared to traditional GCC and SVD algorithms, and validates its effectiveness in low SNR multipath underwater acoustic channels.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865803","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A FD-EDL and Novel Clustering-Based Intrusion Detection System Using G-WEFRPO in MANET Environment 基于G-WEFRPO的基于FD-EDL和聚类的MANET入侵检测系统
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1002/ett.70127
Rajeeve Dharmaraj, P. Ganesh Kumar

Recently, Mobile Ad-hoc Networks (MANETs) have created great interest in wireless communication. Several vulnerabilities are present in these networks. Thus, the pre-existing techniques offered numerous solutions. However, improvement is still required for augmenting the Detection Rate (DR). In this research approach, a Frechet Distribution-based Ensemble Deep Learning FD-EDL with hybrid optimization for an Intrusion Detection System (IDS) in MANET is proposed for augmenting the DR. Primarily, the trust value is computed. After the trust evaluation, the cluster formation and the Cluster Head (CH) selection are done utilizing the Diagonal with Cosine Similarity based K-Means (DCS-KM) algorithm. Then, by utilizing the Ad-hoc On-demand Distance Vector (AODV) algorithm, the path is generated for data transmission. For avoiding packet loss, the split and share strategy is designed in the generated path. Next, by utilizing the Polynomial Structured with Nullified Coupled Markov Chain (PSNCMC) model, noise interference is estimated and mitigated. Subsequently, the data is aggregated. The features are extracted from the aggregated data, and by utilizing Gazelle with Weighted Entropy Functional Red Panda Optimization (G-WEFRPO), the significant features are chosen. Next, for detecting intrusion in the MANET environment, the chosen features are inputted to the classifier. Based on performance metrics, the proposed method's performance is analogized with the baseline techniques in experimental analysis. The proposed system obtains a higher DR than conventional models. Hence, it is highly beneficial for IDS in MANET.

近年来,移动自组织网络(manet)引起了人们对无线通信的极大兴趣。这些网络中存在几个漏洞。因此,已有的技术提供了许多解决方案。然而,提高检测率(DR)仍然需要改进。本文提出了一种基于Frechet分布的集成深度学习FD-EDL混合优化方法,用于MANET入侵检测系统(IDS)的dr增强。经过信任评估后,利用基于余弦相似度的K-Means (DCS-KM)算法进行聚类形成和聚类头(CH)的选择。然后,利用Ad-hoc按需距离矢量(AODV)算法生成数据传输路径。为了避免丢包,在生成路径上设计了分割共享策略。其次,利用消耦马尔可夫链结构多项式(PSNCMC)模型对噪声干扰进行估计和抑制。随后,对数据进行汇总。从聚合数据中提取特征,利用加权熵函数优化算法(G-WEFRPO)选择显著特征。接下来,为了在MANET环境中检测入侵,选择的特征被输入到分类器中。基于性能指标,将该方法的性能与实验分析中的基线技术进行了类比。该系统获得了比传统模型更高的DR。因此,它对MANET中的IDS非常有益。
{"title":"A FD-EDL and Novel Clustering-Based Intrusion Detection System Using G-WEFRPO in MANET Environment","authors":"Rajeeve Dharmaraj,&nbsp;P. Ganesh Kumar","doi":"10.1002/ett.70127","DOIUrl":"https://doi.org/10.1002/ett.70127","url":null,"abstract":"<div>\u0000 \u0000 <p>Recently, Mobile Ad-hoc Networks (MANETs) have created great interest in wireless communication. Several vulnerabilities are present in these networks. Thus, the pre-existing techniques offered numerous solutions. However, improvement is still required for augmenting the Detection Rate (DR). In this research approach, a Frechet Distribution-based Ensemble Deep Learning FD-EDL with hybrid optimization for an Intrusion Detection System (IDS) in MANET is proposed for augmenting the DR. Primarily, the trust value is computed. After the trust evaluation, the cluster formation and the Cluster Head (CH) selection are done utilizing the Diagonal with Cosine Similarity based K-Means (DCS-KM) algorithm. Then, by utilizing the Ad-hoc On-demand Distance Vector (AODV) algorithm, the path is generated for data transmission. For avoiding packet loss, the split and share strategy is designed in the generated path. Next, by utilizing the Polynomial Structured with Nullified Coupled Markov Chain (PSNCMC) model, noise interference is estimated and mitigated. Subsequently, the data is aggregated. The features are extracted from the aggregated data, and by utilizing Gazelle with Weighted Entropy Functional Red Panda Optimization (G-WEFRPO), the significant features are chosen. Next, for detecting intrusion in the MANET environment, the chosen features are inputted to the classifier. Based on performance metrics, the proposed method's performance is analogized with the baseline techniques in experimental analysis. The proposed system obtains a higher DR than conventional models. Hence, it is highly beneficial for IDS in MANET.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143871762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ-Type States 基于三维纠缠ghz型态的量子安全代理盲签名协议
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-24 DOI: 10.1002/ett.70140
Sunil Prajapat, Mohammad S. Obaidat, Vivek Bharmaik, Garima Thakur, Pankaj Kumar

As quantum technology advances, classical digital signatures exhibit vulnerabilities in preserving security properties during the transmission of information. Working toward a reliable communication protocol, we introduce a proxy blind signature scheme to teleport a single particle qubit state with a message to the receiver, employing a three qubit GHZ entangled state. The blindness property is utilized to secure the message information from the proxy signer. A trusted party, Trent, is introduced to supervise the communication process. Alice blinds the original message and sends the Bell measurements with her entangled particle to proxy signer Charlie. After receiving measurements from Alice and Charlie, Bob verifies the proxy blind signature and performs appropriate unitary operations on his particle. Thereafter, Trent verifies the security of the quantum teleportation setup by matching the output data with the original data sent by Alice. Security analysis results prove that the proposed scheme fulfils the basic security necessities, including undeniability, unforgeability, blindness, verifiability, and traceability.

随着量子技术的进步,传统的数字签名在信息传输过程中在保护安全属性方面存在漏洞。为了实现可靠的通信协议,我们引入了一种代理盲签名方案,利用三个量子比特的GHZ纠缠态将带有消息的单粒子量子比特态传送给接收者。盲性属性用于保护来自代理签署者的消息信息。被信任的一方Trent被引入来监督通信过程。爱丽丝屏蔽了原始信息,并将带有纠缠粒子的贝尔测量结果发送给代理签名者查理。在收到Alice和Charlie的测量值后,Bob验证代理盲签名,并对他的粒子执行适当的幺正操作。之后,Trent通过将输出数据与Alice发送的原始数据进行匹配来验证量子隐形传态设置的安全性。安全性分析结果表明,该方案满足了不可否认性、不可伪造性、盲性、可验证性和可追溯性等基本安全性要求。
{"title":"Quantum Safe Proxy Blind Signature Protocol Based on 3D Entangled GHZ-Type States","authors":"Sunil Prajapat,&nbsp;Mohammad S. Obaidat,&nbsp;Vivek Bharmaik,&nbsp;Garima Thakur,&nbsp;Pankaj Kumar","doi":"10.1002/ett.70140","DOIUrl":"https://doi.org/10.1002/ett.70140","url":null,"abstract":"<div>\u0000 \u0000 <p>As quantum technology advances, classical digital signatures exhibit vulnerabilities in preserving security properties during the transmission of information. Working toward a reliable communication protocol, we introduce a proxy blind signature scheme to teleport a single particle qubit state with a message to the receiver, employing a three qubit GHZ entangled state. The blindness property is utilized to secure the message information from the proxy signer. A trusted party, Trent, is introduced to supervise the communication process. Alice blinds the original message and sends the Bell measurements with her entangled particle to proxy signer Charlie. After receiving measurements from Alice and Charlie, Bob verifies the proxy blind signature and performs appropriate unitary operations on his particle. Thereafter, Trent verifies the security of the quantum teleportation setup by matching the output data with the original data sent by Alice. Security analysis results prove that the proposed scheme fulfils the basic security necessities, including undeniability, unforgeability, blindness, verifiability, and traceability.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 5","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Concise Survey on Modern Web-Based Phishing Techniques and Advanced Mitigation Strategies 现代网络钓鱼技术和高级缓解策略简明概览
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-23 DOI: 10.1002/ett.70119
Dhanavanthini Panneerselvam, Sibi Chakkaravarthy Sethuraman, Ajith Jubilson Emerson, Tarun Kumar Kanakam

Phishing is a tactical technique practiced by cyber-criminals, wherein the target systems are approached, made vulnerable, and exploited. A Phisher who does the act of phishing is always creative, calculative, and persistent. This potentially leads to the increase in the success rate of phishing and the individuals who are technically expertise even falls in phishing campaigns. This article discusses about the various web-based phishing techniques used by the modern day cyber criminals. Various mitigation techniques related to the state of the art machine learning and deep learning techniques are also studied. The article also extensively discusses about the features utilized for the detection. Additionally, a qualitative and quantitative comparison of different studies for mitigating the web phishing attacks is also examined.

网络钓鱼是网络犯罪分子使用的一种战术技术,其目的是接近目标系统,使其易受攻击并加以利用。从事网络钓鱼行为的钓鱼者总是富有创造力、善于算计和坚持不懈。这可能会导致网络钓鱼成功率的增加,而具有技术专长的个人甚至会陷入网络钓鱼活动。本文讨论了现代网络犯罪分子使用的各种基于web的网络钓鱼技术。还研究了与最先进的机器学习和深度学习技术相关的各种缓解技术。本文还广泛讨论了用于检测的特征。此外,还对减轻网络钓鱼攻击的不同研究进行了定性和定量比较。
{"title":"A Concise Survey on Modern Web-Based Phishing Techniques and Advanced Mitigation Strategies","authors":"Dhanavanthini Panneerselvam,&nbsp;Sibi Chakkaravarthy Sethuraman,&nbsp;Ajith Jubilson Emerson,&nbsp;Tarun Kumar Kanakam","doi":"10.1002/ett.70119","DOIUrl":"https://doi.org/10.1002/ett.70119","url":null,"abstract":"<div>\u0000 \u0000 <p>Phishing is a tactical technique practiced by cyber-criminals, wherein the target systems are approached, made vulnerable, and exploited. A Phisher who does the act of phishing is always creative, calculative, and persistent. This potentially leads to the increase in the success rate of phishing and the individuals who are technically expertise even falls in phishing campaigns. This article discusses about the various web-based phishing techniques used by the modern day cyber criminals. Various mitigation techniques related to the state of the art machine learning and deep learning techniques are also studied. The article also extensively discusses about the features utilized for the detection. Additionally, a qualitative and quantitative comparison of different studies for mitigating the web phishing attacks is also examined.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865552","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Robotic Cloud Automation-Enabled Attack Detection and Secure Robotic Command Verification Using LADA-C-RNN and S-Fuzzy 基于LADA-C-RNN和S-Fuzzy的机器人云自动化攻击检测和安全机器人命令验证
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-23 DOI: 10.1002/ett.70115
Basava Ramanjaneyulu Gudivaka, Rajya Lakshmi Gudivaka, Raj Kumar Gudivaka, Dinesh Kumar Reddy Basani, Sri Harsha Grandhi, Faheem Khan

The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.

数字技术和人工智能(AI)的兴起导致智能机器人在各个领域的使用增加。然而,安全和信任是在关键基础设施中部署机器人的重要问题。因此,一个安全可靠的机器人指挥控制系统是机器人集成成功的关键。在基于云的机器人控制和数据处理过程中,主流系统都没有关注攻击预测。因此,本文提出了一种基于LADA-C-RNN和S-Fuzzy的rca辅助攻击检测和机器人命令验证的安全模型。机器人控制器最初使用云应用程序中的用户ID和密码进行注册。在登录过程中,SCTDA用于验证机器人控制器的权限。然后,机器人控制器的任务进入攻击检测阶段。在攻击检测阶段,首先收集数据集并进行预处理。然后,进行时间模式分析,然后进行特征提取。然后,通过GMJFOA算法选择最优特征。然后,将选择的特征输入到LADA-C-RNN, LADA-C-RNN进行攻击检测。接下来,将正常数据输入到流量优先级中。然后将优先任务输入到机器人命令数据验证中,从而提高了安全级别。最后,该方法具有最小的延迟,准确率为98.42%。
{"title":"Robotic Cloud Automation-Enabled Attack Detection and Secure Robotic Command Verification Using LADA-C-RNN and S-Fuzzy","authors":"Basava Ramanjaneyulu Gudivaka,&nbsp;Rajya Lakshmi Gudivaka,&nbsp;Raj Kumar Gudivaka,&nbsp;Dinesh Kumar Reddy Basani,&nbsp;Sri Harsha Grandhi,&nbsp;Faheem Khan","doi":"10.1002/ett.70115","DOIUrl":"https://doi.org/10.1002/ett.70115","url":null,"abstract":"<div>\u0000 \u0000 <p>The rise of digital technology and Artificial Intelligence (AI) has led to the increased use of smart robots in various sectors. However, security and trust are significant concerns about deploying robots in critical infrastructures. Therefore, a secure and reliable robotic command control system is essential for successful robot integration. None of the prevailing systems focused on attack prediction during cloud-based robot control and data processing. Hence, this paper proposes a secure model called RCA-assisted attack detection and robotic command verification using LADA-C-RNN and S-Fuzzy. The robot controller is initially registered using the user ID and password in the cloud application. During login, the SCTDA is used to verify the robot controller's authority. Then, the robot controller's task is subjected to the attack detection phase. In the attack detection phase, the dataset is initially gathered and preprocessed. Thereafter, the temporal pattern analysis is done, followed by feature extraction. Subsequently, the optimal features are selected via GMJFOA. Then, the selected features are inputted to the LADA-C-RNN, which performs attack detection. Next, the normal data is fed into the traffic prioritization. Then, the prioritized tasks are inputted to the robot command data verification, thus increasing the security level. Finally, the proposed approach had minimum latency with 98.42% accuracy.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143865974","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media 社交媒体上多方隐私保护的不同方法及有效性评述
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-21 DOI: 10.1002/ett.70130
P. Jayaprabha, K. Paulose Jacob

Social networking is a significant notion that has emerged for effective communication among multiple users. Social media services are in high demand among users all around the world. Privacy is important on social networking sites, and privacy concerns are particularly sensitive. Social media has numerous applications, and ensuring multiparty privacy (MP) among various users is a critical requirement. Massive research has been undertaken to manage secured MP across network users. However, certain issues still come up, like authentication, co-ownership of data by third parties, surveillance, and data misuse. The privacy preferences of a certain user are the priority by which the user can adjust or edit their network settings. Conflicts between users can be avoided, high security for personal data can be achieved, and highly confidential information can be maintained with the help of user preferences. Some security flaws in social media allow for the misuse of private information and the emergence of user conflicts. Therefore, privacy preservation techniques are developed and put into practice in order to address privacy concerns and provide improved security during data transfer. These techniques serve as technical assistance in recognizing and resolving disputes inside the MP management. For the construction of privacy preservation methods, real-world empirical data, user-centered MP controls, privacy-improved party analysis, hypothetical privacy support, and privacy assurance in the case of multiparty agreement are required.

社交网络是一个重要的概念,它的出现是为了在多个用户之间进行有效的交流。世界各地的用户都对社交媒体服务有很高的需求。隐私在社交网站上很重要,隐私问题尤其敏感。社交媒体有许多应用程序,确保不同用户之间的多方隐私(MP)是一项关键要求。已经进行了大量的研究来管理跨网络用户的安全MP。然而,某些问题仍然会出现,如身份验证、第三方数据的共同所有权、监视和数据滥用。特定用户的隐私偏好是用户可以调整或编辑其网络设置的优先级。可以避免用户之间的冲突,实现个人数据的高安全性,并通过用户偏好来维护高度机密的信息。社交媒体上的一些安全漏洞允许滥用私人信息和出现用户冲突。因此,隐私保护技术被开发并付诸实践,以解决隐私问题,并在数据传输过程中提供改进的安全性。这些技术可以作为识别和解决MP管理内部纠纷的技术援助。对于隐私保护方法的构建,需要真实世界的经验数据、以用户为中心的MP控制、隐私改进方分析、假设隐私支持以及多方协议情况下的隐私保证。
{"title":"Critical Review of Different Approaches of Multiparty Privacy Protection Methods and Effectiveness on Social Media","authors":"P. Jayaprabha,&nbsp;K. Paulose Jacob","doi":"10.1002/ett.70130","DOIUrl":"https://doi.org/10.1002/ett.70130","url":null,"abstract":"<div>\u0000 \u0000 <p>Social networking is a significant notion that has emerged for effective communication among multiple users. Social media services are in high demand among users all around the world. Privacy is important on social networking sites, and privacy concerns are particularly sensitive. Social media has numerous applications, and ensuring multiparty privacy (MP) among various users is a critical requirement. Massive research has been undertaken to manage secured MP across network users. However, certain issues still come up, like authentication, co-ownership of data by third parties, surveillance, and data misuse. The privacy preferences of a certain user are the priority by which the user can adjust or edit their network settings. Conflicts between users can be avoided, high security for personal data can be achieved, and highly confidential information can be maintained with the help of user preferences. Some security flaws in social media allow for the misuse of private information and the emergence of user conflicts. Therefore, privacy preservation techniques are developed and put into practice in order to address privacy concerns and provide improved security during data transfer. These techniques serve as technical assistance in recognizing and resolving disputes inside the MP management. For the construction of privacy preservation methods, real-world empirical data, user-centered MP controls, privacy-improved party analysis, hypothetical privacy support, and privacy assurance in the case of multiparty agreement are required.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security and Privacy Preservation via Interference Tolerant Fast Convergence Zeroing Neural Network With Reptile Search Optimization Algorithm in Fog-Cloud Computing 雾云计算中基于爬虫搜索优化算法的容错快速收敛归零神经网络安全与隐私保护
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-21 DOI: 10.1002/ett.70114
Pakkarisamy Janakiraman Sathish Kumar, Neha Verma, Shivani Gupta, Rajendran Jothilakshmi

More vertical service areas than only data processing, storing, and communication are promised by fog-cloud computing. Due to its great efficiency and scalability, distributed deep learning (DDL) across fog-cloud computing environments is a widely used application among them. With training limited to sharing parameters, DDL can offer more privacy protection than centralized deep learning. Nevertheless, DDL still faces two significant security obstacles when it comes to fog-cloud computing are How to ensure that users' identities are not stolen by outside enemies, and How to prevent users' privacy from being disclosed to other internal participants in the process of training. In this manuscript, Interference Tolerant Fast Convergence Zeroing Neural Network for Security and Privacy Preservation with Reptile Search Optimization Algorithm in Fog-Cloud Computing environment (SPP-ITFCZNN-RSOA-FCC) is proposed. ITFCZNN is proposed for security and privacy preservation, Then Reptile Search Optimization Algorithm (RSOA) is proposed to optimize the ITFCZNN, and Effective Lightweight Homomorphic Cryptographic Algorithm (ELHCA) is used to encrypt and decrypt the local gradients. The proposed SPP-ITFCZNN-RSOA-FCC system attains a better security balance, efficiency, and functionality than existing efforts. The proposed SPP-ITFCZNN-RSOA-FCC is implemented using Python. The performance metrics like accuracy, resource overhead, computation overhead, and communication overhead are considered. The performance of the SPP-ITFCZNN-RSOA-FCC approach attains 29.16%, 20.14%, and 18.93% high accuracy, and 11.03%, 26.04%, and 23.51% lower Resource overhead compared with existing methods including FedSDM: Federated learning dependent smart decision making component for ECG data at internet of things incorporated Edge-Fog-Cloud computing (SPP-FSDM-FCC), A collaborative computation with offloading in dew-enabled vehicular fog computing to compute-intensive with latency-sensitive dependence-aware tasks: Federated deep Q-learning method (SPP-FDQL-FCC), and a fog-edge-enabled intrusion identification scheme for smart grids (SPP-FSVM-FCC) respectively.

雾云计算承诺提供比数据处理、存储和通信更多的垂直服务领域。分布式深度学习(distributed deep learning, DDL)由于其在雾云计算环境中的高效和可扩展性,成为其中应用最为广泛的一种。由于训练仅限于共享参数,DDL可以提供比集中式深度学习更多的隐私保护。然而,在雾云计算方面,DDL仍然面临着两个重大的安全障碍:如何确保用户的身份不被外部敌人窃取,以及如何防止用户的隐私在培训过程中泄露给其他内部参与者。本文提出了一种雾云环境下基于爬虫类搜索优化算法的容干扰快速收敛归零神经网络(SPP-ITFCZNN-RSOA-FCC)。采用爬行搜索优化算法(RSOA)对ITFCZNN进行优化,并采用有效轻量级同态加密算法(ELHCA)对局部梯度进行加解密。所提出的SPP-ITFCZNN-RSOA-FCC系统比现有的系统具有更好的安全平衡、效率和功能。提出的SPP-ITFCZNN-RSOA-FCC是使用Python实现的。考虑了准确性、资源开销、计算开销和通信开销等性能指标。SPP-ITFCZNN-RSOA-FCC方法的准确率分别为29.16%、20.14%和18.93%,与现有方法(包括FedSDM)相比,资源开销分别降低了11.03%、26.04%和23.51%。基于联邦学习的物联网心电数据智能决策组件结合了边缘-雾-云计算(SPP-FSDM-FCC),一种将基于露水的车载雾计算中的协同计算转移到对延迟敏感的计算密集型依赖感知任务:联邦深度q -学习方法(SPP-FDQL-FCC)和基于雾边缘的智能电网入侵识别方案(SPP-FSVM-FCC)。
{"title":"Security and Privacy Preservation via Interference Tolerant Fast Convergence Zeroing Neural Network With Reptile Search Optimization Algorithm in Fog-Cloud Computing","authors":"Pakkarisamy Janakiraman Sathish Kumar,&nbsp;Neha Verma,&nbsp;Shivani Gupta,&nbsp;Rajendran Jothilakshmi","doi":"10.1002/ett.70114","DOIUrl":"https://doi.org/10.1002/ett.70114","url":null,"abstract":"<div>\u0000 \u0000 <p>More vertical service areas than only data processing, storing, and communication are promised by fog-cloud computing. Due to its great efficiency and scalability, distributed deep learning (DDL) across fog-cloud computing environments is a widely used application among them. With training limited to sharing parameters, DDL can offer more privacy protection than centralized deep learning. Nevertheless, DDL still faces two significant security obstacles when it comes to fog-cloud computing are How to ensure that users' identities are not stolen by outside enemies, and How to prevent users' privacy from being disclosed to other internal participants in the process of training. In this manuscript, Interference Tolerant Fast Convergence Zeroing Neural Network for Security and Privacy Preservation with Reptile Search Optimization Algorithm in Fog-Cloud Computing environment (SPP-ITFCZNN-RSOA-FCC) is proposed. ITFCZNN is proposed for security and privacy preservation, Then Reptile Search Optimization Algorithm (RSOA) is proposed to optimize the ITFCZNN, and Effective Lightweight Homomorphic Cryptographic Algorithm (ELHCA) is used to encrypt and decrypt the local gradients. The proposed SPP-ITFCZNN-RSOA-FCC system attains a better security balance, efficiency, and functionality than existing efforts. The proposed SPP-ITFCZNN-RSOA-FCC is implemented using Python. The performance metrics like accuracy, resource overhead, computation overhead, and communication overhead are considered. The performance of the SPP-ITFCZNN-RSOA-FCC approach attains 29.16%, 20.14%, and 18.93% high accuracy, and 11.03%, 26.04%, and 23.51% lower Resource overhead compared with existing methods including FedSDM: Federated learning dependent smart decision making component for ECG data at internet of things incorporated Edge-Fog-Cloud computing (SPP-FSDM-FCC), A collaborative computation with offloading in dew-enabled vehicular fog computing to compute-intensive with latency-sensitive dependence-aware tasks: Federated deep Q-learning method (SPP-FDQL-FCC), and a fog-edge-enabled intrusion identification scheme for smart grids (SPP-FSVM-FCC) respectively.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143857114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain-Based Intrusion Detection System for Smart Cities 保护前方道路:基于概念区块链的智慧城市入侵检测系统的车联网安全调查
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-20 DOI: 10.1002/ett.70133
Fatima Al-Quayed, Noshina Tariq, Mamoona Humayun, Farrukh Aslam Khan, Muhammad Attique Khan, Thanaa S. Alnusairi

The Internet of Vehicles (IoV) is a critical component of the smart city. Various nodes exchange sensitive data for urban mobility, such as identification, position, messages, speed, and traffic statistics. Along with developing smart cities come threats to privacy and security through networks. Security is of the highest priority, considering various security-privacy risks from the wellness, safety, and confidentiality of men and women inside the vehicle. This survey presents a detailed analysis of state-of-the-art and evolving security challenges to IoV systems. It handles security challenges, such as data integrity and privacy. It also includes a critical review of the literature to identify gaps in current security mechanisms. It uses complete mathematical modeling and case studies to show the practical effectiveness of the proposed solutions. It aims to guide future development and implementation of more secure, efficient, and resilient IoV systems, particularly in smart city environments. It also introduces a novel Intrusion Detection System (IDS) with Artificial Intelligence (AI), smart contracts, and blockchain technology. These smart contracts ensure instant security with the utmost level of vulnerability through blockchain technology. In addition, we proposed a hybrid multi-layered framework using Fog to conserve the resources at the vehicle level. We used mathematical proof to assess this framework. Merging blockchain, smart contracts, and AI into IoVs could increase human security by removing significant vulnerabilities.

车联网(IoV)是智慧城市的重要组成部分。各种节点交换城市交通的敏感数据,如身份识别、位置、信息、速度和交通统计。随着智能城市的发展,网络隐私和安全也受到威胁。考虑到车内人员的健康、安全和保密等各种安全隐私风险,安全是重中之重。本调查报告详细分析了物联网系统所面临的最新和不断变化的安全挑战。它涉及数据完整性和隐私等安全挑战。它还包括对文献的批判性回顾,以确定当前安全机制的差距。它使用完整的数学建模和案例研究来展示所提解决方案的实际效果。它旨在指导未来开发和实施更安全、更高效、更有弹性的物联网系统,特别是在智慧城市环境中。它还介绍了一种采用人工智能(AI)、智能合约和区块链技术的新型入侵检测系统(IDS)。这些智能合约通过区块链技术确保即时安全,并最大程度地避免漏洞。此外,我们还提出了一个使用雾技术的混合多层框架,以节约车辆层面的资源。我们使用数学证明来评估这一框架。将区块链、智能合约和人工智能融合到物联网汽车中,可以通过消除重大漏洞来提高人类的安全性。
{"title":"Securing the Road Ahead: A Survey on Internet of Vehicles Security Powered by a Conceptual Blockchain-Based Intrusion Detection System for Smart Cities","authors":"Fatima Al-Quayed,&nbsp;Noshina Tariq,&nbsp;Mamoona Humayun,&nbsp;Farrukh Aslam Khan,&nbsp;Muhammad Attique Khan,&nbsp;Thanaa S. Alnusairi","doi":"10.1002/ett.70133","DOIUrl":"https://doi.org/10.1002/ett.70133","url":null,"abstract":"<p>The Internet of Vehicles (IoV) is a critical component of the smart city. Various nodes exchange sensitive data for urban mobility, such as identification, position, messages, speed, and traffic statistics. Along with developing smart cities come threats to privacy and security through networks. Security is of the highest priority, considering various security-privacy risks from the wellness, safety, and confidentiality of men and women inside the vehicle. This survey presents a detailed analysis of state-of-the-art and evolving security challenges to IoV systems. It handles security challenges, such as data integrity and privacy. It also includes a critical review of the literature to identify gaps in current security mechanisms. It uses complete mathematical modeling and case studies to show the practical effectiveness of the proposed solutions. It aims to guide future development and implementation of more secure, efficient, and resilient IoV systems, particularly in smart city environments. It also introduces a novel Intrusion Detection System (IDS) with Artificial Intelligence (AI), smart contracts, and blockchain technology. These smart contracts ensure instant security with the utmost level of vulnerability through blockchain technology. In addition, we proposed a hybrid multi-layered framework using Fog to conserve the resources at the vehicle level. We used mathematical proof to assess this framework. Merging blockchain, smart contracts, and AI into IoVs could increase human security by removing significant vulnerabilities.</p>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1002/ett.70133","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143853029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SDHO-KGNN: An Effective Knowledge-Enhanced Optimal Graph Neural Network Approach for Fraudulent Call Detection SDHO-KGNN:一种有效的知识增强最优图神经网络欺诈呼叫检测方法
IF 2.5 4区 计算机科学 Q3 TELECOMMUNICATIONS Pub Date : 2025-04-20 DOI: 10.1002/ett.70101
Pooja Mithoo, Manoj Kumar

Rapid advancements in mobile communication technologies have led to the progression of telecom scams that not only deplete individual fortunes but also affect social income. Hence, fraudulent call detection gains significance, which not only aims to proactively recognize the frauds, but also alleviate the fraudulent activities to manage external losses. Though the traditional methods, such as rule-based systems and supervised machine learning techniques, actively engage in detecting such fraudulent activities, they fail to adapt to the evolving fraud patterns. Therefore, this research introduces a sheepdog hunt optimization-enabled knowledge-enhanced optimal graph neural network classifier (SDHO-KGNN) approach for detecting fraudulent calls accurately. The effectiveness of the proposed SDHO-KGNN approach is achieved through the combination of the power of graph representation learning with expert insights, which allows the proposed SDHO-KGNN approach to capture complex relationships and patterns within telecom data. Additionally, the integration of the SDHO algorithm enhances model performance by optimizing the discrimination between legitimate and fraudulent calls. Moreover, the SDHO-KGNN classifier captures the intricate call patterns and relationships within dynamic call networks, thereby attaining a better accuracy, precision, and recall of 93.8%, 95.91%, and 95.53% for 90% of the training.

移动通信技术的快速发展导致了电信诈骗的发展,不仅耗尽了个人财富,而且影响了社会收入。因此,欺诈性呼叫检测具有重要意义,它不仅可以主动识别欺诈行为,还可以减轻欺诈活动,管理外部损失。尽管传统方法,如基于规则的系统和监督机器学习技术,积极参与检测此类欺诈活动,但它们无法适应不断变化的欺诈模式。因此,本研究引入了一种牧羊犬狩猎优化的知识增强最优图神经网络分类器(SDHO-KGNN)方法来准确检测欺诈呼叫。所提出的sho - kgnn方法的有效性是通过将图表示学习的力量与专家见解相结合来实现的,这使得所提出的sho - kgnn方法能够捕获电信数据中的复杂关系和模式。此外,集成的SDHO算法通过优化合法呼叫和欺诈呼叫之间的区分来提高模型性能。此外,SDHO-KGNN分类器捕获了动态呼叫网络中复杂的呼叫模式和关系,从而在90%的训练中获得了更好的准确率、精度和召回率,分别为93.8%、95.91%和95.53%。
{"title":"SDHO-KGNN: An Effective Knowledge-Enhanced Optimal Graph Neural Network Approach for Fraudulent Call Detection","authors":"Pooja Mithoo,&nbsp;Manoj Kumar","doi":"10.1002/ett.70101","DOIUrl":"https://doi.org/10.1002/ett.70101","url":null,"abstract":"<div>\u0000 \u0000 <p>Rapid advancements in mobile communication technologies have led to the progression of telecom scams that not only deplete individual fortunes but also affect social income. Hence, fraudulent call detection gains significance, which not only aims to proactively recognize the frauds, but also alleviate the fraudulent activities to manage external losses. Though the traditional methods, such as rule-based systems and supervised machine learning techniques, actively engage in detecting such fraudulent activities, they fail to adapt to the evolving fraud patterns. Therefore, this research introduces a sheepdog hunt optimization-enabled knowledge-enhanced optimal graph neural network classifier (SDHO-KGNN) approach for detecting fraudulent calls accurately. The effectiveness of the proposed SDHO-KGNN approach is achieved through the combination of the power of graph representation learning with expert insights, which allows the proposed SDHO-KGNN approach to capture complex relationships and patterns within telecom data. Additionally, the integration of the SDHO algorithm enhances model performance by optimizing the discrimination between legitimate and fraudulent calls. Moreover, the SDHO-KGNN classifier captures the intricate call patterns and relationships within dynamic call networks, thereby attaining a better accuracy, precision, and recall of 93.8%, 95.91%, and 95.53% for 90% of the training.</p>\u0000 </div>","PeriodicalId":23282,"journal":{"name":"Transactions on Emerging Telecommunications Technologies","volume":"36 4","pages":""},"PeriodicalIF":2.5,"publicationDate":"2025-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143852876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Transactions on Emerging Telecommunications Technologies
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1