Oleksandr Kuznetsov

Orcid: 0000-0003-2331-6326

According to our database1, Oleksandr Kuznetsov authored at least 54 papers between 2015 and 2026.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book  In proceedings  Article  PhD thesis  Dataset  Other 

Links

On csauthors.net:

Bibliography

2026
Privacy-preserving federated learning for multi-regional disability employment matching: a comprehensive framework with differential privacy and blockchain anchoring.
Discov. Artif. Intell., December, 2026

Deep learning models for robust facial liveness detection.
Multim. Tools Appl., March, 2026

LUT-Compiled Kolmogorov-Arnold Networks for Lightweight DoS Detection on IoT Edge Devices.
CoRR, January, 2026

LUT-KAN: Segment-wise LUT Quantization for Fast KAN Inference.
CoRR, January, 2026

Intelligent Systems: From Theory to Applications - Foundations, Search Algorithms, and Machine Learning
Cognitive Technologies, Springer, ISBN: 978-3-032-00043-9, 2026

2025
A Production-Ready Machine Learning System for Inclusive Employment: Requirements Engineering and Implementation of AI-Driven Disability Job Matching Platform.
CoRR, August, 2025

Efficient Denial of Service Attack Detection in IoT using Kolmogorov-Arnold Networks.
CoRR, February, 2025

Dataset Dependency in CNN-Based Copy-Move Forgery Detection: A Multi-Dataset Comparative Analysis.
Mach. Learn. Knowl. Extr., 2025

Optimizing Merkle Proof Size Through Path Length Analysis: A Probabilistic Framework for Efficient Blockchain State Verification.
Future Internet, 2025

DeepStego: Privacy-Preserving Natural Language Steganography Using Large Language Models and Advanced Neural Architectures.
Comput., 2025

Interpretable Predictive Modeling for Educational Equity: A Workload-Aware Decision Support System for Early Identification of At-Risk Students.
Big Data Cogn. Comput., 2025

Delay-Driven Information Diffusion in Telegram: Modeling, Empirical Analysis, and the Limits of Competition.
Big Data Cogn. Comput., 2025

Blockchain-Native Asset Direction Prediction: A Confidence-Threshold Approach to Decentralized Financial Analytics Using Multi-Scale Feature Integration.
Algorithms, 2025

Advancing Visual Recognition with Kolmogorov-Arnold Networks: A Novel Hybrid Architecture for Edge Computing Applications.
Proceedings of the 11th Sapienza Yearly Symposium of Technology, 2025

Cross-Temporal Feature Integration in Cryptocurrency Direction Prediction: A Confidence-Optimized Binary Classification Approach.
Proceedings of the Information Technology and Implementation (IT&I) Workshop: Information Systems and Intelligent Cyber Protection (IT&I-WS: ISICP 2025), Kyiv, Ukraine, November 20, 2025

Securing Digital Communications with AI-Enhanced Synonym Substitution in Text.
Proceedings of the 10th International Conference of Yearly Reports on Informatics, 2025

Lightweight Anomaly Detection for IoT: Evaluating Machine Learning and Deep Learning Models on CICIDS2017.
Proceedings of the Artificial Intelligence and Soft Computing, 2025

2024
Evaluating the Security of Merkle Trees: An Analysis of Data Falsification Probabilities.
Cryptogr., September, 2024

Efficient and Universal Merkle Tree Inclusion Proofs via OR Aggregation.
Cryptogr., September, 2024

NFT Technology for Enhanced Global Digital Registers: A Novel Approach to Tokenization.
Future Internet, July, 2024

Enhancing copy-move forgery detection through a novel CNN architecture and comprehensive dataset analysis.
Multim. Tools Appl., June, 2024

Enhancing Smart Communication Security: A Novel Cost Function for Efficient S-Box Generation in Symmetric Key Cryptography.
Cryptogr., June, 2024

Beyond traditional steganography: enhancing security and performance with spread spectrum image steganography.
Appl. Intell., April, 2024

Deep learning-based biometric cryptographic key generation with post-quantum security.
Multim. Tools Appl., 2024

Efficient Zero-Knowledge Proofs for Set Membership in Blockchain-Based Sensor Networks: A Novel OR-Aggregation Approach.
J. Sens. Actuator Networks, 2024

Merkle trees in blockchain: A Study of collision probability and security implications.
Internet Things, 2024

Adaptive Merkle trees for enhanced blockchain scalability.
Internet Things, 2024

Unrecognizable yet identifiable: Image distortion with preserved embeddings.
Eng. Appl. Artif. Intell., 2024

Probabilistic Analysis and Empirical Validation of Patricia Tries in Ethereum State Management.
CoRR, 2024

Scalable Zero-Knowledge Proofs for Verifying Cryptographic Hashing in Blockchain Applications.
CoRR, 2024

Evaluating the Security of Merkle Trees in the Internet of Things: An Analysis of Data Falsification Probabilities.
CoRR, 2024

Adaptive Restructuring of Merkle and Verkle Trees for Enhanced Blockchain Scalability.
CoRR, 2024

Hybrid Population-Based Hill Climbing Algorithm for Generating Highly Nonlinear S-boxes.
Comput., 2024

AttackNet: Enhancing biometric security via tailored convolutional neural network architectures for liveness detection.
Comput. Secur., 2024

Corrections to "On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security".
IEEE Access, 2024

On the Integration of Artificial Intelligence and Blockchain Technology: A Perspective About Security.
IEEE Access, 2024

Enhanced Security and Efficiency in Blockchain With Aggregated Zero-Knowledge Proof Mechanisms.
IEEE Access, 2024

Trust-Based Security Architecture for Edge Computing: A Simulation Study of Dynamic Trust Evolution and Attack Detection.
Proceedings of the Selected Papers of the XI International Scientific Conference "Information Technology and Implementation" (IT&I 2024). Conference Proceedings, 2024

Embedding Non-distortive Cancelable Face Template Generation.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

A Novel Approach to Cancelable Biometrics Through Deep Learning Distortion Metrics.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

Utilizing Evolutionary Algorithms for the Synthesis of Cryptographic Substitution Patterns.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

Advanced Steganography in 3D Models: An AI-Powered Approach.
Proceedings of the Artificial Intelligence and Soft Computing, 2024

Scalable zero-knowledge proofs for verifying cryptographic hashing in blockchain applications (short paper).
Proceedings of the Classic, 2024

Evolutionary approach to S-box generation: Optimizing nonlinear substitutions in symmetric ciphers.
Proceedings of the Classic, 2024

Enhancing blockchain scalability through zero-knowledge proofs: A novel block finality system for near protocol.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

Performance analysis of symmetric encryption algorithms for time-critical cybersecurity application.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II, 2024

2023
Integrating Non-Positional Numbering Systems into E-Commerce Platforms: A Novel Approach to Enhance System Fault Tolerance.
J. Theor. Appl. Electron. Commer. Res., 2023

Cross-Database Liveness Detection: Insights from Comparative Biometric Analysis.
Proceedings of the 2nd International Workshop on Social Communication and Information Activity in Digital Humanities (SCIA 2023), 2023

Achieving Enhanced Security in Biometric Authentication: A Rigorous Analysis of Code-Based Fuzzy Extractor.
Proceedings of the Selected Papers of the X International Scientific Conference "Information Technology and Implementation" (IT&I-2023). Conference Proceedings, Kyiv, Ukraine, November 20, 2023

Trade-offs in Post-Quantum Cryptography: A Comparative Assessment of BIKE, HQC, and Classic McEliece.
Proceedings of the Workshop on Classic, 2023

Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

A Comprehensive Decentralized Digital Identity System: Blockchain, Artificial Intelligence, Fuzzy Extractors, and NFTs for Secure Identity Management.
Proceedings of the Cybersecurity Providing in Information and Telecommunication Systems II co-located with International Conference on Problems of Infocommunications. Science and Technology (PICST 2023), 2023

2015
A New Encryption Standard of Ukraine: The Kalyna Block Cipher.
IACR Cryptol. ePrint Arch., 2015

A New Standard of Ukraine: The Kupyna Hash Function.
IACR Cryptol. ePrint Arch., 2015


  Loading...