-
141
LightEnsemble-Guard: An Optimized Ensemble Learning Framework for Securing Resource-Constrained IoT Systems
Published 2025“…The results highlight LightEnsemble-Guard as an effective, scalable and lightweight solution for real-time IoT security, significantly outperforming traditional models in both accuracy and computational efficiency.…”
-
142
-
143
-
144
-
145
Dimensional and positional temporomandibular joint osseous characteristics in normodivergent facial patterns with and without temporomandibular disorders
Published 2023“…Three-dimensional positional and dimensional temporomandibular joint characteristics, including glenoid fossa, mandibular condyles, and joint spaces, were assessed by cone beam computed tomography.</p><h3>Results</h3><p dir="ltr">The glenoid fossa positions in the three orthogonal planes and height showed statistical significance between the two studied groups. …”
-
146
Internet of everything meets the metaverse: Bridging physical and virtual worlds with blockchain
Published 2024“…However, despite substantial advancements in related fields, there remains a significant gap in comprehensive surveys that address the integration of AI/ML, 6G, and blockchain in the Metaverse. …”
-
147
Psychological inoculation against problematic social media use among adolescents: An experimental study
Published 2025“…The passive inoculation group showed a significant decrease in deception only. No changes were observed in the control group. …”
-
148
-
149
The use of multi-task learning in cybersecurity applications: a systematic literature review
Published 2024“…<p dir="ltr">Cybersecurity is crucial in today’s interconnected world, as digital technologies are increasingly used in various sectors. The risk of cyberattacks targeting financial, military, and political systems has increased due to the wide use of technology. …”
-
150
-
151
-
152
-
153
-
154
-
155
Tamp-X: Attacking explainable natural language classifiers through tampered activations
Published 2022“…Recently Explainable Artificial Intelligence (XAI) methods have been proposed as a method for increasing DNN’s reliability and trustworthiness. These XAI methods are however open to attack and can be manipulated in both white-box (gradient-based) and black-box (perturbation-based) scenarios. …”
-
156
-
157
-
158
-
159
-
160
Intelligent scaling for 6G IoE services for resource provisioning
Published 2021“…For 6G, more innovative technological resources are required to be handled by Mobile Edge Computing (MEC). Although the demand for change in service from different sectors, the increase in IoE, the limitation of available computing resources of MEC, and intelligent resource solutions are getting much more significant. …”