Number of engineering systems can be characterized as complex since they have a dynamic and nonlinear behaviour incorporating a stochastic uncertainty. On the other hand, as a machine learning method, Gaussian process...
详细信息
Flower image classification poses a challenge in digital image processing, requiring effective methods for feature extraction and classification. the aim of this research is to improve the accuracy of flower image cla...
详细信息
Secure computation of multiparty protocol (MPP) is being widely used to address privacy issues in various technologies, such as cryptocurrencies, blockchain, and many more. the security of MPP is computed in various s...
详细信息
the escalating frequency of cyber attacks against industrial installations over the past decade underscores the growing imperative to fortify cybersecurity in organizations. the advent of Industry 4.0 has interconnect...
详细信息
the growing relevance of data science in engineering highlights the challenges of modelling complex systems using conventional methods, which are often time-consuming. this paper explores the application of various ma...
详细信息
Security systems Assurance (SSA) is crucial as digital threats evolve and cybersecurity becomes more complex. Recent advancements in large language models (LLMs) have opened new avenues for enhancing SSA strategies. T...
详细信息
Server-based face recognition access control (SFRAC) is a widely used biometric authentication method where a camera captures a user's face image and sends the face information to a backend server to determine an ...
详细信息
ISBN:
(纸本)9783031649530;9783031649547
Server-based face recognition access control (SFRAC) is a widely used biometric authentication method where a camera captures a user's face image and sends the face information to a backend server to determine an authentication result. In existing systems, user face images or raw facial features are sent to the backend server, which induces privacy concerns. this paper proposes a method to protect user face privacy in SFRAC systems, such that user face images or raw facial features are never sent to the server, but the system can still do face-based access control. the method uses a novel partially order-preserving hash-induced transformation (POP-HIT) to perform feature transformation on facial embeddings. POP-HIT maps a user's facial features to a transformed space in order to preserve privacy. Authentication is performed by checking the transformed facial embedding of the user's face image captured at the time of authentication against the user's pre-stored transformed facial embeddings at the server, based on similarity metrics or machine learning methods. Since the server only sees transformed facial embeddings, which cannot be used to recover the facial image, facial privacy is protected. Analysis and experimental evaluations show that our method has a high authentication accuracy, and it achieves privacy protection without being vulnerable to impersonation attacks.
Timed Buchi automata provide a very expressive formalism for expressing requirements of real-time systems. Online monitoring of embedded real-time systems can then be achieved by symbolic execution of such automata on...
详细信息
ISBN:
(纸本)9783031765537;9783031765544
Timed Buchi automata provide a very expressive formalism for expressing requirements of real-time systems. Online monitoring of embedded real-time systems can then be achieved by symbolic execution of such automata on the trace observed from the system. this direct construction however only is faithful if observation of the trace is immediate in the sense that the monitor can assign exact time stamps to the actions it observes, which is rarely true in practice due to the substantial and fluctuating parametric delays introduced by the circuitry connecting the observed system to its monitoring device. We present a purely zone-based online monitoring algorithm, which handles such parametric delays exactly without recurrence to costly verification procedures for parametric timed automata. We have implemented our monitoring algorithm on top of the real-time model checking tool UPPAAL, and report on encouraging initial results.
the proceedings contain 103 papers. the topics discussed include: evolutionary hyper-heuristics for improving global optimization algorithms;multi-objective decision making system based on spatial -temporal logics;ana...
ISBN:
(纸本)9798350313390
the proceedings contain 103 papers. the topics discussed include: evolutionary hyper-heuristics for improving global optimization algorithms;multi-objective decision making system based on spatial -temporal logics;analysis of trajectory optimization for solving tower of Hanoi problem using industrial manipulator;achievements regarding the optimal control of refinery processes;experimental study of pressure variation in a constant volume enclosure;velocity computation for vehicle trajectory tracking: a comparative analysis of performance and efficiency;smart digital-twin hub concept for rice yield prediction and monitoring from multivariate time series data;enhanced cyber-physical system with semantic technologies and machine learning to support smart farming;qualified remote signature through a hybrid cloud architecture;and an industry 4.0 oriented predictive maintenance solution deployed in real-world automotive manufacturing facilities.
computer Vision techniques are extensively utilised in entertainment, enhancing realism in games and movies. Within video games, these techniques enable the recognition of objects, characters, and player movements, th...
详细信息
暂无评论