This article explores the high interaction attack defense mechanism based on runtime application self-protection (RASP) technology in power system network security reinforcement. With the rapid development of informat...
详细信息
This paper introduces a new Convolutional Neural network (ConvNet) architecture inspired by a class of partial differential equations (PDEs) called quasi-linear hyperbolic systems. With comparable performance on image...
详细信息
ISBN:
(数字)9789819991198
ISBN:
(纸本)9789819991181;9789819991198
This paper introduces a new Convolutional Neural network (ConvNet) architecture inspired by a class of partial differential equations (PDEs) called quasi-linear hyperbolic systems. With comparable performance on image classification task, it allows for the modification of the weights via a continuous group of symmetry. This is a significant shift from traditional models where the architecture and weights are essentially fixed. We wish to promote the (internal) symmetry as a new desirable property for a neural network, and to draw attention to the PDE perspective in analyzing and interpreting ConvNets in the broader Deep Learning community.
As the demand for high-performance and dynamically adaptable network services continues to grow, the convergence of quantum computing and network orchestration represents a promising development. This paper explores t...
详细信息
ISBN:
(纸本)9798350359107;9798350359091
As the demand for high-performance and dynamically adaptable network services continues to grow, the convergence of quantum computing and network orchestration represents a promising development. This paper explores the transformative potential of quantum computing in the orchestration of network services and introduces new paradigms that transcend classical limitations. Using a case study, we propose a workflow for an exemplary link failure process for generative AI (GenAI) and quantum computing-based service orchestration in an edge cloud (EC) network. Later, we address the challenges of integrating services based on quantum computing (using a quantum search algorithm to select the best connections) with GenAI-based topology control and management in an orchestration framework. Our work also introduces multi-solution quantum search for orchestrating services across different edge clouds, emphasizing efficiency and accuracy. Algorithmic considerations, including the impact of the oracle and hybrid approaches, are also thoroughly explored. We conclude the paper with potentials and comparisons of possible GenAI techniques and quantum search algorithms in terms of their advantages and disadvantages.
Nowadays, in various domains including distributed control, telecommunication, robotics and economics to address the problems, Multi-Agent systems (MAS) is used. To solve with preprogrammed agent behavior complexity o...
详细信息
With the increasing availability of simultaneous panchromatic and hyperspectral images, object detection methods based on them have demonstrated significant application advantages. However, they still face several cha...
详细信息
The proceedings contain 33 papers. The special focus in this conference is on Computational Intelligence in Security for Information systems. The topics include: An Approach Based on LLMs for Forensic Threat...
ISBN:
(纸本)9783031750151
The proceedings contain 33 papers. The special focus in this conference is on Computational Intelligence in Security for Information systems. The topics include: An Approach Based on LLMs for Forensic Threat Detection in Autonomous systems;smart Water Meter network Anomaly and Failure Detection System;Design and Implementation of a Fast, Platform-Adaptive, AIS-20/31 Compliant PLL-Based True Random Number Generator on a Zynq 7020 SoC FPGA;A Comparison of Frameworks for Heterogeneous Computing Using High-performance Pattern-Matching for DNA Biometrics and Digital Forensics;Fuzzing Robotic Software Using HPC and LLM;performance Impact of Strengthening the Accountability and Explainability System in Autonomous Robots;Generation of Industrial Protocol-Traffic via Enhanced Wasserstein GAN;cyber Security in Hospitals: A network-Oriented Model for Behavioural Learning of Employees During Phishing Simulations;Augmenting API Security Testing with Automated LLM-Driven Test Generation;Exploring the Use of LLMs to Understand network Traces;securing V2X Communication: A Hybrid Deep Learning Approach for Misbehavior Detection;Use of GAN Models and CNN Heatmaps in Malware;Evaluating Sniffers, IDS, and IPS: A Systematic Literature Mapping;performance Analysis of NTT Algorithms;exploring the Landscape of Honeypots in the Fight Against Cyber Threats: A Systematic Mapping of Literature;phishing and Spam Prevention Powered by Jetson Nano;decentralized Edge-Based Detection of Label Flipping Attacks in Federated Learning;analysis of Post-Quantum Cryptographic Algorithms: A Systematic Literature Review;A Comparison of AI-Enabled Techniques for the Detection of Attacks in IoT Devices;understanding Malware Dynamics in IoT networks: Dataset Construction Using Mathematical Epidemiology and Complex networks;Quality of Service Enhancement for IoT-Based Smart Office System Using Ad Hoc On-Demand Distance Vector-Smart control Ration control Algorithm (AODV-SRCA);cyberattack Detector for Real-Time
With the rapid development of Internet of Things technology, intelligent traffic signal controlsystems have become an excellent way to improve traffic efficiency and safety. In this paper, we model an intelligent tra...
详细信息
With the continuous advancement of communication technology, GEO (geostationary orbit) satellite has shown significant advantages in the field of long-distance communication, and will be an important part of the futur...
详细信息
This study introduces a robust and adaptive control synthesis mechanism for the attitude and position stabilisation of quadcopter unmanned aerial systems (UAS). Ensuring robustness in the face of uncertainties is cruc...
详细信息
This study proposes an optimal cooperative control framework for heterogeneous vehicle platoons using a neural network (NN)-based reinforcement learning (RL) algorithm in an identifier-critic-actor framework. Typicall...
详细信息
暂无评论