{"id":"https://openalex.org/W4417152295","doi":"https://doi.org/10.1007/s10791-025-09843-4","title":"LSTM guided homomorphic encryption for threat-resistant IoT networks","display_name":"LSTM guided homomorphic encryption for threat-resistant IoT networks","publication_year":2025,"publication_date":"2025-12-09","ids":{"openalex":"https://openalex.org/W4417152295","doi":"https://doi.org/10.1007/s10791-025-09843-4","pmid":"https://pubmed.ncbi.nlm.nih.gov/41383494"},"language":"en","primary_location":{"id":"doi:10.1007/s10791-025-09843-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09843-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09843-4.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj","pubmed"],"open_access":{"is_oa":true,"oa_status":"diamond","oa_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09843-4.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100619038","display_name":"Sanjeev Kumar","orcid":"https://orcid.org/0000-0001-7728-3668"},"institutions":[{"id":"https://openalex.org/I905734797","display_name":"Maharshi Dayanand University","ror":"https://ror.org/03kaab451","country_code":"IN","type":"education","lineage":["https://openalex.org/I905734797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sanjeev Kumar","raw_affiliation_strings":["Department of Computer Science & Application, Maharshi Dayanand University, Rohtak, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Application, Maharshi Dayanand University, Rohtak, India","institution_ids":["https://openalex.org/I905734797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5007496465","display_name":"Sukhvinder Singh Deora","orcid":"https://orcid.org/0000-0003-3796-7365"},"institutions":[{"id":"https://openalex.org/I905734797","display_name":"Maharshi Dayanand University","ror":"https://ror.org/03kaab451","country_code":"IN","type":"education","lineage":["https://openalex.org/I905734797"]}],"countries":["IN"],"is_corresponding":false,"raw_author_name":"Sukhvinder Singh Deora","raw_affiliation_strings":["Department of Computer Science & Application, Maharshi Dayanand University, Rohtak, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science & Application, Maharshi Dayanand University, Rohtak, India","institution_ids":["https://openalex.org/I905734797"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102880705","display_name":"Tajinder Kumar","orcid":"https://orcid.org/0000-0002-7079-7065"},"institutions":[{"id":"https://openalex.org/I4210155601","display_name":"Innovative Research (United States)","ror":"https://ror.org/04dec0k98","country_code":"US","type":"company","lineage":["https://openalex.org/I4210155601"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tajinder Kumar","raw_affiliation_strings":["Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana India","Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana India","institution_ids":["https://openalex.org/I4210155601"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana, India","institution_ids":["https://openalex.org/I4210155601"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061246696","display_name":"Purushottam Sharma","orcid":"https://orcid.org/0000-0002-8037-7152"},"institutions":[{"id":"https://openalex.org/I155125381","display_name":"Galgotias University","ror":"https://ror.org/02w8ba206","country_code":"IN","type":"education","lineage":["https://openalex.org/I155125381"]}],"countries":["IN"],"is_corresponding":true,"raw_author_name":"Purushottam Sharma","raw_affiliation_strings":["School of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh India","School of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh India","institution_ids":["https://openalex.org/I155125381"]},{"raw_affiliation_string":"School of Computer Science and Engineering, Galgotias University, Greater Noida, Uttar Pradesh, India","institution_ids":["https://openalex.org/I155125381"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5027459275","display_name":"Xiaochun Cheng","orcid":"https://orcid.org/0000-0003-0371-9646"},"institutions":[{"id":"https://openalex.org/I39586589","display_name":"Swansea University","ror":"https://ror.org/053fq8t95","country_code":"GB","type":"education","lineage":["https://openalex.org/I39586589"]},{"id":"https://openalex.org/I4210113874","display_name":"Energy Safety Research Institute","ror":"https://ror.org/026znxe07","country_code":"GB","type":"facility","lineage":["https://openalex.org/I39586589","https://openalex.org/I4210113874"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Xiaochun Cheng","raw_affiliation_strings":["Computer Science Department, Bay Campus, Swansea University, Fabian Way, Swansea, Wales, SA1 8EN UK","Computer Science Department, Bay Campus, Swansea University, Fabian Way, Swansea, Wales, SA1 8EN, UK"],"affiliations":[{"raw_affiliation_string":"Computer Science Department, Bay Campus, Swansea University, Fabian Way, Swansea, Wales, SA1 8EN UK","institution_ids":["https://openalex.org/I39586589","https://openalex.org/I4210113874"]},{"raw_affiliation_string":"Computer Science Department, Bay Campus, Swansea University, Fabian Way, Swansea, Wales, SA1 8EN, UK","institution_ids":["https://openalex.org/I39586589","https://openalex.org/I4210113874"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5011914527","display_name":"Vishal Garg","orcid":"https://orcid.org/0000-0002-2599-2785"},"institutions":[{"id":"https://openalex.org/I4210155601","display_name":"Innovative Research (United States)","ror":"https://ror.org/04dec0k98","country_code":"US","type":"company","lineage":["https://openalex.org/I4210155601"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Vishal Garg","raw_affiliation_strings":["Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana India","Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana, India"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana India","institution_ids":["https://openalex.org/I4210155601"]},{"raw_affiliation_string":"Department of Computer Science and Engineering, Jai Parkash Mukand Lal Innovative Engineering and Technology Institute, Radaur, Haryana, India","institution_ids":["https://openalex.org/I4210155601"]}]}],"institutions":[],"countries_distinct_count":3,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5027459275","https://openalex.org/A5061246696"],"corresponding_institution_ids":["https://openalex.org/I155125381","https://openalex.org/I39586589","https://openalex.org/I4210113874"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":true,"cited_by_count":0,"citation_normalized_percentile":{"value":0.20163374,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"28","issue":"1","first_page":"301","last_page":"301"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2224999964237213,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.2224999964237213,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11498","display_name":"Security in Wireless Sensor Networks","score":0.17669999599456787,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.06949999928474426,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/homomorphic-encryption","display_name":"Homomorphic encryption","score":0.7354000210762024},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.7246000170707703},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.57669997215271},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.54830002784729},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5429999828338623},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.5099999904632568},{"id":"https://openalex.org/keywords/ciphertext","display_name":"Ciphertext","score":0.47929999232292175},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.45570001006126404},{"id":"https://openalex.org/keywords/internet-of-things","display_name":"Internet of Things","score":0.4016000032424927}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8027999997138977},{"id":"https://openalex.org/C158338273","wikidata":"https://www.wikidata.org/wiki/Q2154943","display_name":"Homomorphic encryption","level":3,"score":0.7354000210762024},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.7246000170707703},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.57669997215271},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.54830002784729},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5429999828338623},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.5099999904632568},{"id":"https://openalex.org/C93974786","wikidata":"https://www.wikidata.org/wiki/Q1589480","display_name":"Ciphertext","level":3,"score":0.47929999232292175},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.461899995803833},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.45570001006126404},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.4016000032424927},{"id":"https://openalex.org/C166501710","wikidata":"https://www.wikidata.org/wiki/Q5132476","display_name":"Client-side encryption","level":4,"score":0.39070001244544983},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3894999921321869},{"id":"https://openalex.org/C2779585090","wikidata":"https://www.wikidata.org/wiki/Q3457762","display_name":"Resilience (materials science)","level":2,"score":0.382099986076355},{"id":"https://openalex.org/C75684735","wikidata":"https://www.wikidata.org/wiki/Q858810","display_name":"Big data","level":2,"score":0.3718000054359436},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.3666999936103821},{"id":"https://openalex.org/C203062551","wikidata":"https://www.wikidata.org/wiki/Q201339","display_name":"Public-key cryptography","level":3,"score":0.3183000087738037},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3091999888420105},{"id":"https://openalex.org/C73468433","wikidata":"https://www.wikidata.org/wiki/Q1639918","display_name":"Hybrid cryptosystem","level":4,"score":0.3066999912261963},{"id":"https://openalex.org/C93996380","wikidata":"https://www.wikidata.org/wiki/Q44127","display_name":"Server","level":2,"score":0.29739999771118164},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.2842000126838684},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.27799999713897705},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2768999934196472},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.27559998631477356},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.2734000086784363},{"id":"https://openalex.org/C112313634","wikidata":"https://www.wikidata.org/wiki/Q7886648","display_name":"Complement (music)","level":5,"score":0.27079999446868896},{"id":"https://openalex.org/C2778456923","wikidata":"https://www.wikidata.org/wiki/Q5337692","display_name":"Edge computing","level":3,"score":0.26820001006126404}],"mesh":[],"locations_count":4,"locations":[{"id":"doi:10.1007/s10791-025-09843-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09843-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09843-4.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},{"id":"pmid:41383494","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/41383494","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover computing","raw_type":null},{"id":"pmh:oai:doaj.org/article:c670a71315774640bf360dd66c7058cf","is_oa":true,"landing_page_url":"https://doaj.org/article/c670a71315774640bf360dd66c7058cf","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discover Computing, Vol 28, Iss 1, Pp 1-39 (2025)","raw_type":"article"},{"id":"pmh:oai:pubmedcentral.nih.gov:12689805","is_oa":true,"landing_page_url":"https://pmc.ncbi.nlm.nih.gov/articles/PMC12689805/","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Discov Comput","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10791-025-09843-4","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10791-025-09843-4","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10791-025-09843-4.pdf","source":{"id":"https://openalex.org/S5407036663","display_name":"Discover Computing","issn_l":"2948-2992","issn":["2948-2992"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Discover Computing","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G2485155987","display_name":null,"funder_award_id":"EP/W020408/1","funder_id":"https://openalex.org/F4320320667","funder_display_name":"Swansea University"},{"id":"https://openalex.org/G3744454158","display_name":null,"funder_award_id":"RS718","funder_id":"https://openalex.org/F4320320667","funder_display_name":"Swansea University"},{"id":"https://openalex.org/G89022868","display_name":null,"funder_award_id":"Grant EP/W020408/1 and Grant RS718","funder_id":"https://openalex.org/F4320314731","funder_display_name":"UK Research and Innovation"}],"funders":[{"id":"https://openalex.org/F4320314731","display_name":"UK Research and Innovation","ror":"https://ror.org/001aqnf71"},{"id":"https://openalex.org/F4320320667","display_name":"Swansea University","ror":"https://ror.org/053fq8t95"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4417152295.pdf","grobid_xml":"https://content.openalex.org/works/W4417152295.grobid-xml"},"referenced_works_count":44,"referenced_works":["https://openalex.org/W2031533839","https://openalex.org/W2768174108","https://openalex.org/W3013329636","https://openalex.org/W3120215141","https://openalex.org/W3132111025","https://openalex.org/W3135568666","https://openalex.org/W3152142677","https://openalex.org/W3158958930","https://openalex.org/W3163084407","https://openalex.org/W3173128495","https://openalex.org/W3199875322","https://openalex.org/W3205073294","https://openalex.org/W3210184437","https://openalex.org/W3214299919","https://openalex.org/W4213445714","https://openalex.org/W4220866225","https://openalex.org/W4224299815","https://openalex.org/W4226042732","https://openalex.org/W4226150519","https://openalex.org/W4285106051","https://openalex.org/W4285196740","https://openalex.org/W4294740700","https://openalex.org/W4295308536","https://openalex.org/W4302734258","https://openalex.org/W4307823778","https://openalex.org/W4312105706","https://openalex.org/W4313644197","https://openalex.org/W4318065634","https://openalex.org/W4319004607","https://openalex.org/W4367055702","https://openalex.org/W4376644581","https://openalex.org/W4385569630","https://openalex.org/W4387489765","https://openalex.org/W4388831851","https://openalex.org/W4390483481","https://openalex.org/W4393054637","https://openalex.org/W4394829180","https://openalex.org/W4399392855","https://openalex.org/W4400409839","https://openalex.org/W4401634624","https://openalex.org/W4402129615","https://openalex.org/W4404633002","https://openalex.org/W4406309620","https://openalex.org/W4408317367"],"related_works":[],"abstract_inverted_index":{"The":[0,61,125,145,158],"rapid":[1],"growth":[2],"of":[3,6,36,89,147],"the":[4,30,148,162,165],"Internet":[5],"Things":[7],"(IoT)":[8],"has":[9,19,151],"led":[10],"to":[11,29,56,171,192],"revolutionary":[12],"innovations":[13],"in":[14,22,58,164,196],"many":[15],"fields;":[16],"however,":[17],"it":[18,116],"also":[20],"resulted":[21],"significant":[23],"security":[24],"and":[25,33,54,114,122,129,141,180,189],"privacy":[26,53],"issues":[27],"due":[28],"resource":[31],"limitations":[32],"distributed":[34],"nature":[35],"IoT":[37,197],"networks.":[38,198],"Traditional":[39],"cryptographic":[40],"techniques":[41,173],"or":[42],"machine":[43],"learning-based":[44],"anomaly":[45,86,112],"detection":[46,113],"systems":[47],"do":[48],"not":[49],"jointly":[50],"provide":[51],"data":[52],"resilience":[55],"threats":[57],"real":[59,156],"time.":[60],"existing":[62,172],"methods,":[63],"such":[64,174],"as":[65,175],"Homomorphic":[66,106],"Encryption":[67,107],"(HE),":[68],"offer":[69],"a":[70,155,186],"high":[71],"computation":[72],"cost":[73],"for":[74],"performing":[75,90],"encryption.":[76,91],"Furthermore,":[77],"Long":[78],"Short-Term":[79],"Memory":[80],"(LSTM)":[81],"networks":[82],"can":[83],"predict":[84],"an":[85],"profile":[87],"instead":[88],"To":[92],"address":[93],"these":[94],"shortcomings,":[95],"this":[96],"paper":[97],"proposes":[98],"NeuroCrypt.":[99],"This":[100],"new":[101],"hybrid":[102],"system":[103],"combines":[104],"Fully":[105],"(FHE)":[108],"with":[109,117],"LSTM-based":[110],"encrypted":[111,143],"supplements":[115],"blockchain-based":[118],"dynamic":[119],"key":[120],"management":[121],"multi-factor":[123],"authentication.":[124],"architecture":[126],"targets":[127],"edge":[128],"fog":[130],"computing":[131],"settings":[132],"using,":[133],"among":[134],"other":[135],"techniques,":[136],"ciphertext":[137],"packing,":[138],"model":[139],"quantisation,":[140],"parallelised":[142],"operations.":[144],"performance":[146],"proposed":[149,166],"framework":[150,167],"been":[152],"evaluated":[153],"on":[154],"dataset.":[157],"results":[159],"show":[160],"that":[161],"accuracy":[163],"is":[168],"99.2%":[169],"compared":[170],"HE-based":[176],"DNN,":[177],"FL-based":[178],"models,":[179],"LSTM":[181],"IDS.":[182],"Conclusively,":[183],"NeuroCrypt":[184],"provides":[185],"privacy-preserving,":[187],"effective,":[188],"scalable":[190],"solution":[191],"real-time":[193],"threat":[194],"abatement":[195]},"counts_by_year":[],"updated_date":"2026-04-21T08:09:41.155169","created_date":"2025-12-09T00:00:00"}
