Mikhail Babenko

ORCID: 0000-0001-7066-0061
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Residue Arithmetic
  • Cryptography and Data Security
  • Advanced Data Storage Technologies
  • Cloud Data Security Solutions
  • Chaos-based Image/Signal Encryption
  • Advanced Data Processing Techniques
  • Numerical Methods and Algorithms
  • Coding theory and cryptography
  • Cryptographic Implementations and Security
  • Cybersecurity and Information Systems
  • Privacy-Preserving Technologies in Data
  • Neural Networks and Applications
  • Information Systems and Technology Applications
  • Parallel Computing and Optimization Techniques
  • Advanced Computational Techniques in Science and Engineering
  • Cloud Computing and Resource Management
  • Complexity and Algorithms in Graphs
  • graph theory and CDMA systems
  • Blockchain Technology Applications and Security
  • IoT and Edge/Fog Computing
  • Advanced Scientific Research Methods
  • Mobile Ad Hoc Networks
  • Big Data Technologies and Applications
  • Image Processing and 3D Reconstruction
  • Computability, Logic, AI Algorithms

North-Caucasus Federal University
2015-2024

Institute for System Programming
2020-2024

Sirius University of Science and Technology
2021-2023

South Ural State University
2018

National Research University Higher School of Economics
2017

Indian Institute of Information Technology Allahabad
2015

Abstract Classical machine learning modeling demands considerable computing power for internal calculations and training with big data in a reasonable amount of time. In recent years, clouds provide services to facilitate this process, but it introduces new security threats breaches. Modern encryption techniques ensure are considered as the best option protect stored transit from an unauthorized third-party. However, decryption process is necessary when must be processed or analyzed, falling...

10.1007/s12083-021-01076-8 article EN cc-by Peer-to-Peer Networking and Applications 2021-03-08

Internet-of-Things (IoT) environment has a dynamic nature with high risks of confidentiality, integrity, and availability violations. The loss information, denial access, information leakage, collusion, technical failures, data security breaches are difficult to predict anticipate in advance. These types nonstationarity one the main issues design reliable IoT infrastructure capable mitigating their consequences. It is not sufficient propose solutions for given scenario, but mechanisms adapt...

10.1109/jiot.2020.2981276 article EN IEEE Internet of Things Journal 2020-03-16

The residue number system (RNS) is an unconventional which can lead to parallel and fault-tolerant arithmetic operations. However, the complexity of residue-to-binary conversion for large moduli reduces overall RNS performance, makes it inefficient nowadays high-performance computation systems. In this paper, we present improved approximate Chinese remainder theorem (CRT) with aim performing efficient general sets. To achieve aim, required fraction bits accurate derived. Besides, a method...

10.1080/00207160.2016.1247439 article EN International Journal of Computer Mathematics 2016-10-15

We discuss issues of modular learning in artificial neural networks and explore possibilities the partial use modules when computational resources are limited. The proposed method is based on ability a wavelet transform to separate information into high- low-frequency parts. Using expertise gained developing convolutional networks, authors perform transverse-layer partitioning network for further devices with low capability. theoretical justification this approach paper supported by...

10.18287/2412-6179-co-1278 article EN cc-by Computer Optics 2024-04-01

A smart city has a complex hierarchical communication system with various components. It must meet the requirements of fast connection, reliability, and security without data compromise. Internet Things technology is widely used to provide connectivity control solutions for sensors other devices using heterogeneous networking technologies. In this paper, we propose routing solution Wireless Sensor Networks (WSN) Mobile Ad hoc NETworks (MANET) increasing speed, sufficient security. Many...

10.3390/s23073738 article EN cc-by Sensors 2023-04-04

Number comparison has long been recognized as one of the most fundamental non-modular arithmetic operations to be executed in a non-positional Residue System (RNS). In this paper, new technique for designing comparators RNS numbers represented an arbitrary moduli set is presented. It based on newly introduced modified diagonal function, whose strictly monotonic properties make it possible replace cumbersome finding remainder division by large and awkward number with significantly simpler...

10.3390/electronics9111784 article EN Electronics 2020-10-27

Ensuring reliable data storage in a cloud environment is challenging problem. One of the efficient mechanisms used to solve it Redundant Residue Number System (RRNS) with projection method, commonly mechanism for detecting errors. However, error correction based on method has exponential complexity depending number control and working moduli. In this paper, we propose an optimization using base extension Hamming distance reduce calculated projections. We show that they can be reduced up...

10.1109/ipdpsw52791.2021.00087 article EN 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) 2021-06-01

Cloud computing has become a part of people's lives. However, there are many unresolved problems with security this technology. According to the assessment international experts in field security, risks appearance cloud collusion uncertain conditions. To mitigate type uncertainty, and minimize data redundancy encryption together harms caused by collusion, modified threshold Asmuth-Bloom weighted Mignotte secret sharing schemes used. We show that if villains do know parts, and/or not key,...

10.1109/dexa.2017.44 article EN 2017-08-01

In this paper, a new simplified iterative division algorithm for modular numbers that is optimized on the basis of Chinese remainder theorem (CRT) with fractions developed. It requires less computational resources than CRT integers and mixed radix number systems (MRNS). The main idea (a) to transform residual representation dividend divisor into weighted fixed-point code (b) find higher power 2 in written residue system (RNS). This information acquired using fractions: defined by zeros...

10.3390/electronics8030261 article EN Electronics 2019-02-27

Today, cloud technology continues to evolve. Using services allows you get financial benefitsio Still, many companies and users are in no hurry transfer their infrastructure the due incompletely resolved problems related security of data storage processing. Since case storing processing open data, a provider gets access an attacker can also gain by hacking account. In encrypted transmission cloud, confidentiality will be preserved only tasks, since require decryption task. The use...

10.1109/eiconrus49466.2020.9039110 article EN 2020-01-01

This paper addresses error correction codes approach in order to improve the performance of BOINC under uncertainty users' behavior. Redundant Residue Number System (RRNS) moduli set special form provides user unfairness, reliability, decreased redundancy and load computing network. Error code RRNS is improved by using syndrome. It decreases amount computations required for data decoding up 20/7 times compared projection methods. The proposed modification syndrome allow omit assumption that...

10.1109/dexa.2017.46 article EN 2017-08-01

This article presents a study related to increasing the performance of distributed computing systems. The essence fog lies in use so-called edge devices. These devices are low-power, so they extremely sensitive computational complexity methods used. is aimed at improving efficiency calculations while maintaining an appropriate level reliability by applying Residue Number System (RNS). We investigating for determining sign number RNS based on core function order develop new, fast method. As...

10.3390/computation11070124 article EN cc-by Computation 2023-06-28

In this paper, a study is carried out related to improving the reliability and fault tolerance of Fog Computing systems. This work continuation previous studies. past, we have developed method fast operation for determining sign number in Residue Number System based on Akushsky Core Function. We managed increase efficiency calculations by using approximate rank number. However, result not final. consider detail methods techniques During research, it was found that so-called weights can be...

10.3390/app131810495 article EN cc-by Applied Sciences 2023-09-20

Cloud technologies are widely used for storage services. However, the single cloud cannot ensure reliability of data. To solve security issue, we present a multi-cloud based architecture called WA-RRNS that combines weighted access scheme and threshold secret sharing redundant residue number system with multiple failure detection/recovery mechanisms homomorphic ciphers. For better tradeoffs between performance, uses parameters to adjust redundancy, encryption-decryption speed, data loss...

10.1109/ipdpsw.2018.00107 article EN 2022 IEEE International Parallel and Distributed Processing Symposium Workshops (IPDPSW) 2018-05-01
Coming Soon ...