According to the World Health Organization (WHO), approximately 537 million individuals are currently living with diabetes, with projections suggesting an annual increase of 3%. Efficient techniques for determining th...
详细信息
The utility of ubiquitous computing systems drives large-scale software development with millions of lines of code (LOC). As there are vast code sets, it also increases the possibility of coding errors since it is dif...
详细信息
ISBN:
(纸本)9798350326970
The utility of ubiquitous computing systems drives large-scale software development with millions of lines of code (LOC). As there are vast code sets, it also increases the possibility of coding errors since it is difficult for even highly trained software engineers to write flawless code. Such flawed software can lead to severe issues once deployed. McCabe and Halstead proposed feature extractors for source code to define software quality. Based on the static features proposed by McCabe and Halstead, we run a series of feature engineering techniques and different machine learning models to detect code defects and use explainable algorithms to assess the prediction quality. We report different processing pipeline combinations to detect defects and compare the approaches. We conclude the paper with comments on the nature of the dataset and establish a baseline for further research.
Website Fingerprinting (WF) is commonly used to deanonymize the Tor users. Meanwhile, WF can also be applied to the hidden service (HS) side, to destroy the anonymity of the HS operator. However, the attacker faces th...
详细信息
ISBN:
(纸本)9798350381993;9798350382006
Website Fingerprinting (WF) is commonly used to deanonymize the Tor users. Meanwhile, WF can also be applied to the hidden service (HS) side, to destroy the anonymity of the HS operator. However, the attacker faces the problem of no available data for training. To solve this problem, previous researchers build mirror sites and use the data collected on them to train the classifier. However, this approach still has limitations: The attacker cannot tell whether the target HS is some HS that is not in the set of sites he mirrors, i.e, an HS in the wild. To address this, we propose a novel two-phase approach to deanonymize HSs that using the website fingerprint collected on the remote node, i.e., a node on the same RP circuit with HS. Our approach does not rely on mirror sites because we decouple feature extraction from classification, so that mirror sites are only involved in the training of the feature extractor and are not related to the classification process. The experimental results show that our attack is effective in both closed-world and open-world scenarios.
Aiming at the low accuracy of straw burning recognition and the inability to identify tiny straw burning flames, an improved Graph-YOLOV3 algorithm is proposed to identify straw burning images, making it more accurate...
详细信息
The emergence of smart devices has raised demand for numerous computational paradigms, including cloud computing, fog computing, and the Internet of Things. But even in these paradigms, efficient resource allocation i...
详细信息
In the contemporary digital era, spreading false information via social media and Internet platforms poses a significant challenge. Not only the data has become increasingly multimodal, lack of sufficient labeled data...
详细信息
Lately, creative displaying methods have been utilized to foster dependable expectation models for microgrids. Computational Insight (CI) innovations are perceived as a vital methodology for improving and planning mic...
详细信息
A particular kind of neural network called an autoencoder (AE) is trained to discover a reduced and effective representation (encoding) of input data. In most of the applications of AE, it is found that this model has...
详细信息
Identification of fresh air by predicting air quality Index is very important for providing better healthy environment to the society. Air pollution causes a severe health issues for the humans as well as threat to th...
详细信息
Vision is one of the important pathways for human perception of external information, with over 80% of perception being acquired through vision. How to enable computers to possess efficient and flexible visual systems...
详细信息
暂无评论