Oleksandr Kuznetsov

Orcid: 0000-0003-2331-6326

According to our database1, Oleksandr Kuznetsov authored at least 42 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Deep Learning Models for Robust Facial Liveness Detection.
CoRR, August, 2025

Efficient Denial of Service Attack Detection in IoT using Kolmogorov-Arnold Networks.
CoRR, February, 2025

Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification.
Future Internet, 2025

Advancing Visual Recognition with Kolmogorov-Arnold Networks: A Novel Hybrid Architecture for Edge Computing Applications.
Proceedings of the 11th Sapienza Yearly Symposium of Technology, 2025

Securing Digital Communications with AI-Enhanced Synonym Substitution in Text.
Proceedings of the 10th International Conference of Yearly Reports on Informatics, 2025

2024
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.
Cryptogr., September, 2024

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation.
Cryptogr., September, 2024

NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization.
Future Internet, July, 2024

Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis.
Multim. Tools Appl., June, 2024

Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.
Cryptogr., June, 2024

Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography.
Appl. Intell., April, 2024

Deep learning-based biometric cryptographic key generation with post-quantum security.
Multim. Tools Appl., 2024

Efficient Zero-Knowledge Proofs for Set Membership in Blockchain-Based Sensor Networks: A Novel OR-Aggregation Approach.
J. Sens. Actuator Networks, 2024

Merkle trees in blockchain: A Study of collision probability and security implications.
Internet Things, 2024

Adaptive Merkle trees for enhanced blockchain scalability.
Internet Things, 2024

Unrecognizable yet identifiable: Image distortion with preserved embeddings.
Eng. Appl. Artif. Intell., 2024

Probabilistic Analysis and Empirical Validation of Patricia Tries in Ethereum State Management.
CoRR, 2024

Scalable Zero-Knowledge Proofs for Verifying Cryptographic Hashing in Blockchain Applications.
CoRR, 2024

Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities.
CoRR, 2024

Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability.
CoRR, 2024

Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear S-boxes.
Comput., 2024

AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection.
Comput. Secur., 2024

Corrections to "On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security".
IEEE Access, 2024

On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security.
IEEE Access, 2024

Enhanced Security and Efficiency in Blockchain With Aggregated Zero-Knowledge Proof Mechanisms.
IEEE Access, 2024

Trust-Based Security Architecture for Edge Computing: A Simulation Study of Dynamic Trust Evolution and Attack Detection.
Proceedings of the Selected Papers of the XI International Scientific Conference "Information Technology and Implementation" (IT&I 2024). Conference Proceedings, 2024

Embedding Non-distortive Cancelable Face Template Generation.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

A Novel Approach to Cancelable Biometrics Through Deep Learning Distortion Metrics.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

Utilizing Evolutionary Algorithms for the Synthesis of Cryptographic Substitution Patterns.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

Advanced Steganography in 3D Models: An AI-Powered Approach.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

Scalable zero-knowledge proofs for verifying cryptographic hashing in blockchain applications (short paper).
Proceedings of the Classic, 2024

Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers.
Proceedings of the Classic, 2024

Enhancing blockchain scalability through zero-knowledge proofs: A novel block finality system for near protocol.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

2023
Integrating Non-Positional Numbering Systems into E-Commerce Platforms: A Novel Approach to Enhance System Fault Tolerance.
J. Theor. Appl. Electron. Commer. Res., 2023

Cross-Database Liveness Detection: Insights from Comparative Biometric Analysis.
Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), 2023

Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor.
Proceedings of the Selected Papers of the X International Scientific Conference "Information Technology and Implementation" (IT&I-2023). Conference Proceedings, Kyiv, Ukraine, November 20, 2023

Trade-offs in Post-Quantum Cryptography: A Comparative Assessment of BIKE, HQC, and Classic McEliece.
Proceedings of the Workshop on Classic, 2023

Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2015
A New Encryption Standard of Ukraine: The Kalyna Block Cipher.
IACR Cryptol. ePrint Arch., 2015

A New Standard of Ukraine: The Kupyna Hash Function.
IACR Cryptol. ePrint Arch., 2015


  Loading...