The proceedings contain 28 papers. The special focus in this conference is on Information systems Security. The topics include: S-RFUP: Secure Remote Firmware Update Protocol;securing Virtual Reality Apps Inter-proces...
ISBN:
(纸本)9783031800191
The proceedings contain 28 papers. The special focus in this conference is on Information systems Security. The topics include: S-RFUP: Secure Remote Firmware Update Protocol;securing Virtual Reality Apps Inter-process Communication;Securing the Web: Analysis of HTTP Security Headers in Popular Global Websites;Countering Subscription Concealed Identifier (SUCI)-Catchers in Cellular Communications;BP-MAP: A Secure and Convenient Mutual Authentication Protocol;effects of Soft-Domain Transfer and Named Entity Information on Deception Detection;Paving the Way: Advancing V2X Safety Through Innovative Attack Generation and Analysis Framework (V2X-SAF);from Traits to Threats: Learning Risk Indicators of Malicious Insider Using Psychometric Data;Identifying Insecure Network Configurations Through Attack modeling and Explainable AI;QIris: Quantum Implementation of Rainbow Table Attacks;insights from Running 24 Static Analysis Tools on Open Source Software Repositories;REMEDII: Robust Malware Detection with Iterative and Intelligent Adversarial Training;semantics-Based Static Vulnerability Detection in Solidity Using Abstract Interpretation;web Privacy Perceptions Amongst Indian Users;Enabling Privacy in IT Service Operations;Privacy-Preserving Photo Sharing: An SSI Use Case;zone Recovery Attack on a Secure Privacy-Preserving Ride-Matching Protocol;Making EULA Great Again: A Novel Nudge Mechanism to Improve Readability, User Attention and Awareness;a Decoupling Mechanism for Transaction Privacy;Protecting Ownership of Trained DNN Models with Zero-Knowledge Proofs;MALAI: ML-Based Attack on Learning with Error Problem;patch Based Backdoor Attack on Deep Neural Networks;integrating Crypto-Based Payment systems for Data Marketplaces: Enhancing Efficiency, Security, and User Autonomy;IntelliSOAR: Intelligent Alert Enrichment Using Security Orchestration Automation and Response (SOAR);inTrust: An Asset Monitoring, Analysis and Vulnerability Assessment System for Zero Trust Network.
Waste is causing a serious environmental problem. Waste management and circular economy offers a best alternative for preserving the environment and protecting nature resources. This paper presents an AI-based system ...
详细信息
ISBN:
(数字)9798331506520
ISBN:
(纸本)9798331506537
Waste is causing a serious environmental problem. Waste management and circular economy offers a best alternative for preserving the environment and protecting nature resources. This paper presents an AI-based system for waste identification and sorting, particularly focusing on plastic, which is the less decomposed waste, using computer vision techniques. The data, used for system validation, comprises publicly available datasets and a locally collected dataset, devoted to plastic classification and detection. Performance metrics demonstrate that YOLOv8 outperforms other deep learning solutions, in real-time waste detection and is well suited for implementation on a Raspberry Pi 4 Model B. The system outperforms also existing methods in terms of efficiency, accuracy, and speed, and is a promising solution for addressing the global waste management challenge.
Image captioning is a pivotal field in AI, enabling machines to generate descriptive text for images, with applications in accessibility, content creation, and human-computer interaction. This study identifies the sho...
详细信息
ISBN:
(数字)9798331529246
ISBN:
(纸本)9798331529253
Image captioning is a pivotal field in AI, enabling machines to generate descriptive text for images, with applications in accessibility, content creation, and human-computer interaction. This study identifies the shortcomings of the conventional CNN-RNN model by proposing an advanced architecture that incorporates InceptionV3, LSTM, attention mechanism, and beam search. The image features are extracted using Incep-tionV3; captions are generated using LSTMs, where an attention mechanism is used to guide the model to identify important regions of the image for each word. Beam search has been employed to choose the most optimal captions. The suggested model is tested on the Flickr8k data set with the help of the BLEU metric. The outcomes show that the caption relevance, diversity, and interpretability of the model are enhanced, with BLEU-1 and BLEU-2 scores of 0.5365 and 0.3218 respectively, demonstrating its potential in real-world applications such as providing accessibility and machine learning-based content generation.
Diffusion models have demonstrated exceptional ability in modeling complex image distributions, making them versatile plug-and-play priors for solving imaging inverse problems. However, their reliance on large-scale c...
详细信息
In recent days, blood pressure monitoring and hypertension prediction have become essential for effective measurement and management. Continuously tracking blood pressure helps in making informed decisions like changi...
详细信息
Document Image Dewarping (DID) task aims to address the issue of geometry distortion and improve image quality. In this paper, we propose a simple but effective method, named DocHFormer, that can take hierar...
详细信息
This research explores the integration of big data technologies and machine learning to enhance cybersecurity in enterprise environments focusing on proactive threat detection and prevention. Traditional security syst...
详细信息
Obtaining high-quality remote sensing images is crucial in generating a three-dimensional terrain for flight simulators. However, due to the presence of haze and other impact factors, collected remote sensing images u...
详细信息
This paper analyzes a design of overvoltage mitigation filter using high-frequency cable modeling in long transmission lines for silicon carbide inverter systems. The SiC inverter systems operating with long transmiss...
详细信息
ISBN:
(数字)9798331516116
ISBN:
(纸本)9798331516123
This paper analyzes a design of overvoltage mitigation filter using high-frequency cable modeling in long transmission lines for silicon carbide inverter systems. The SiC inverter systems operating with long transmission lines may experience overvoltage caused by voltage reflection, leading to insulation breakdown. The proposed method to address the problem of overvoltage occurring on long transmission lines involves connecting a RLC filter at the end of the cable to reduce the overvoltage. The RLC filter is calculated by deriving the characteristic impedance using the parameters of the cable modeling. The validity of cable modeling and designing overvoltage mitigation filter is verified through simulation results.
This paper aims to contribute to the literature on planning and implementing mathematical modelling tasks in the higher education curriculum. Specifically, we propose and discuss a lesson plan carried out within the c...
详细信息
暂无评论