the internet of things (IoT) describes a network in which devices are interconnected and equipped with sensors and software, and other advanced technologies, enabling the collection and exchange of data. these devices...
详细信息
the proceedings contain 24 papers. the topics discussed include: soft single-branch ensemble trees for anomaly detection;integrating online learning and causal inference strategies for big data analysis and prediction...
ISBN:
(纸本)9798400717857
the proceedings contain 24 papers. the topics discussed include: soft single-branch ensemble trees for anomaly detection;integrating online learning and causal inference strategies for big data analysis and prediction;rating refinement and optimized clustering for rating prediction using collaborative filtering;toward deep learning based intrusion detection system: a survey;post-quantum attribute-based authenticated key agreement protocol for smart healthcare;GB-GAIN: granular-ball conditional generative adversarial imputation networks for incomplete data;state-of-the-art review on intelligent computing-based privacy preservation technologies for power internet of things;and fuzzy-based trust in distributed networks: a state-of-the-art review.
As the healthcare sector transitions to the internet of Medical things (IoMT), it promises significant improvements in productivity by streamlining processes, reducing administrative burdens, and automating routine ta...
详细信息
In order to solve the problems of the low sense of participation in the project, inconvenient control of the equipment and complex control process, an intelligent interactive system is designed in this paper. the syst...
详细信息
As the most important energy exchange hub of the new power system, the distribution network is of great significance for supporting clean energy production and electricity substitution for energy consumption. the bloc...
详细信息
Adopting Digital Twin (DT) technology in vehicular edge computing (VEC) enables efficient capture of real-time state information of applications, thereby addressing complex task scheduling problems. Existing literatur...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
Adopting Digital Twin (DT) technology in vehicular edge computing (VEC) enables efficient capture of real-time state information of applications, thereby addressing complex task scheduling problems. Existing literature studies considered only minimizing service latency for task offloading;however, there is room for exploring strategies to enhance user Quality of Experience (QoE) in timeliness and reliability domains. In this paper, we have developed an optimization framework using Mixed Integer Linear Programming (MILP), namely QuETOD, which minimizes service latency by allocating task execution responsibility to highly reliable and reputed vehicles in a DT-enabled VEC environment. the developed QuETOD framework clusters the vehicles based on the demand-supply theory of economics by considering computing resources and utilizing the multi-weighted subjective logic for getting the proper reputation update of the vehicles. the experimental results of the developed QuETOD system depict significant performance improvement in terms of QoE and reliability compared to the state-of-the-art works as high as 15% and 25%, respectively.
In recent years, numerous large-scale cyberattacks have exploited internet of things (IoT) devices, a phenomenon that is expected to escalate withthe continuing proliferation of IoT technology. Despite considerable e...
详细信息
ISBN:
(纸本)9798350369458;9798350369441
In recent years, numerous large-scale cyberattacks have exploited internet of things (IoT) devices, a phenomenon that is expected to escalate withthe continuing proliferation of IoT technology. Despite considerable efforts in attack detection, intrusion detection systems remain mostly reactive, responding to specific patterns or observed anomalies. this work proposes a proactive approach to anticipate and mitigate malicious activities before they cause damage. this paper proposes a novel network intrusion prediction framework that combines Large Language Models (LLMs) with Long Short Term Memory (LSTM) networks. the framework incorporates two LLMs in a feedback loop: a fine-tuned Generative Pre-trained Transformer (GPT) model for predicting network traffic and a fine-tuned Bidirectional Encoder Representations from Transformers (BERT) for evaluating the predicted traffic. the LSTM classifier model then identifies malicious packets among these predictions. Our framework, evaluated on the CICIoT2023 IoT attack dataset, demonstrates a significant improvement in predictive capabilities, achieving an overall accuracy of 98%, offering a robust solution to IoT cybersecurity challenges.
Aiming at the security of data sharing in the internet of vehicles environment, we propose a user-searchable and revocable data-sharing scheme in the Multi-Fog-IoVs. the scheme utilizes a fog node to alleviate the com...
详细信息
In the power internet of things (power IoTs), the connections between many electric power equipments and modules with sensing and communication functions are facing the security challenge and privacy disclosure risk. ...
详细信息
ISBN:
(纸本)9798400717857
In the power internet of things (power IoTs), the connections between many electric power equipments and modules with sensing and communication functions are facing the security challenge and privacy disclosure risk. Artificial intelligence (AI),especially intelligent computing, is widely acknowledged as an effective approach for preserving privacy. However, there remains a notable gap for a comprehensive review paper focused on intelligent computing-based privacy preservation technologies in power IoTs. therefore, conducting a state-of-the-art review on this subject has become imperative. In this paper,the recent relevant research works are aimed to compare and analyze. Moreover,the privacy preservation schemes based on AI are summarized. Lastly, the conclusions are provided.
this work proposes a real-time sentiment analysis pipeline on customer feedback using Yelp and addresses the high-volume dynamic user-generated contents processing problem. the proposal integrates state-of-the-art mac...
详细信息
暂无评论