In recent years, withthe growing demand for real-time video transmission, ensuring the security of video stream data has become critical. this paper addresses the secure transmission of real-time video streams by usi...
详细信息
this paper proposes a federated learning-based intrusion detection framework that incorporates the TCN-GRU model for security monitoring in industrial control systems. the TCN module effectively extracts long-term dep...
详细信息
We designed a system perception model under edge computing that supports Local Differential Privacy(LDP). To address the privacy protection challenges during the data submission phase in Mobile Crowdsensing(MCS) and t...
详细信息
College of computer Science Beijing University of Technology, Beijing 100124, China, 1374622525@*** this paper proposes a trust collaboration technology for edge computing, addressing trust isolation and security issu...
详细信息
Withthe continuous development of drone remote sensing technology, drone networks have garnered widespread attention. the application of drones has expanded from military uses to industrial and civilian sectors, faci...
详细信息
In the Industrial Internet of things (IIoT) landscape, machine-to-machine (M2M) communication is extensively employed, allowing IoT devices to interact autonomously without human intervention. Despite its benefits, M2...
详细信息
Phishing emails are a common means of phishing and their detection is an important aspect of email security. In this study, Meta Phishing Detector Agent system is designed, which is constructed based on Meta GPT frame...
详细信息
Aiming at the problems of semi-transparent smoke misdetection and fire missing detection in multi-scene fire smoke detection, a multi-scene fire smoke detection algorithm based on YOLOv8 is proposed. Firstly, deformab...
详细信息
the advent of Industry 4.0 has established the Industrial Internet of things (IIoT) as the technological bedrock for achieving intelligent industrial production across key sectors, including smart manufacturing, power...
详细信息
As edge computing becomes an increasingly important computing model, trust management and security issues are becoming more severe. Problems such as malicious node attacks and trust isolation pose threats to the secur...
详细信息
暂无评论