On-site warnings can decrease the range of late alert zone during earthquakes. This study develops a deep learning model to predict whether the maximum peak ground acceleration at a station exceeds 25 Gal based on the...
详细信息
The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant *** and timely diagnosis increases t...
详细信息
The application of deep learning techniques in the medical field,specifically for Atrial Fibrillation(AFib)detection through Electrocardiogram(ECG)signals,has witnessed significant *** and timely diagnosis increases the patient’s chances of ***,issues like overfitting and inconsistent accuracy across datasets remain *** a quest to address these challenges,a study presents two prominent deep learning architectures,ResNet-50 and DenseNet-121,to evaluate their effectiveness in AFib *** aim was to create a robust detection mechanism that consistently performs *** such as loss,accuracy,precision,sensitivity,and Area Under the Curve(AUC)were utilized for *** findings revealed that ResNet-50 surpassed DenseNet-121 in all evaluated *** demonstrated lower loss rate 0.0315 and 0.0305 superior accuracy of 98.77%and 98.88%,precision of 98.78%and 98.89%and sensitivity of 98.76%and 98.86%for training and validation,hinting at its advanced capability for AFib *** insights offer a substantial contribution to the existing literature on deep learning applications for AFib detection from ECG *** comparative performance data assists future researchers in selecting suitable deep-learning architectures for AFib ***,the outcomes of this study are anticipated to stimulate the development of more advanced and efficient ECG-based AFib detection methodologies,for more accurate and early detection of AFib,thereby fostering improved patient care and outcomes.
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into block...
详细信息
Differential Privacy(DP)stands as a secure and efficient mechanism for privacy preservation,offering enhanced data utility without compromising computational *** adaptability is evidenced by its integration into blockchain-based Internet of Things(IoT)contexts,including smart wearables,smart homes,***,a notable vulnerability surfaces in decentralized environments where existing DP mechanisms falter in withstanding collusion *** vulnerability stems from the absence of an efficient strategy to synchronize the privacy budget consumption and historical query information among all network *** can exploit this weakness,collaborating to inject a substantial volume of queries simultaneously into disparate blockchain nodes to extract more precise *** address this issue,we propose a novel dual response DP mechanism to preserve privacy in blockchain-based IoT *** encompasses both direct and indirect response strategies,enabling an adaptive response to external queries,aiming to provide better data utility while preserving ***,this mechanism can synchronize historical query information and privacy budget consumption within the blockchain network to prevent privacy *** employ Relative Error(RE),Mean Square Error(MSE),and privacy budget consumption as evaluation metrics to measure the performance of the proposed *** outcomes substantiate that the proposed mechanism can adapt to blockchain networks well,affirming its capacity for privacy and great utility.
The proliferation of interconnected devices is driving a surge in the demand for wireless spectrum. Meeting the need for wireless channel access for every device, while also ensuring consistent quality of service (QoS...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
Recently, the bio-inspired spike camera with continuous motion recording capability has attracted tremendous attention due to its ultra high temporal resolution imaging characteristic. Such imaging feature results in ...
详细信息
Modern microservice systems have become increasingly complicated due to the dynamic and complex interactions and runtime environment. It leads to the system vulnerable to performance issues caused by a variety of reas...
详细信息
The proliferation of Internet of Things (IoT) technologies and ubiquitous connectivity has led to uncrewed aerial vehicles (UAVs) playing key role as edge servers, revolutionizing the wireless communications landscape...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that has been deliberately or accidentally polluted with *** presents a challenge in learning robust GNNs under noisy *** address this issue,we propose a novel framework called Soft-GNN,which mitigates the influence of label noise by adapting the data utilized in *** approach employs a dynamic data utilization strategy that estimates adaptive weights based on prediction deviation,local deviation,and global *** better utilizing significant training samples and reducing the impact of label noise through dynamic data selection,GNNs are trained to be more *** evaluate the performance,robustness,generality,and complexity of our model on five real-world datasets,and our experimental results demonstrate the superiority of our approach over existing methods.
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS...
详细信息
ISBN:
(纸本)9798331508692
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS) face several issues, including data privacy concerns and high-power consumption due to centralized data processing. These challenges increase the risks of unauthorized access, data breaches, and privacy violations, undermining user trust and compliance with privacy regulations. Additionally, the centralization of data and processing leads to higher power consumption, making these systems less sustainable for widespread deployment in smart cities. This research addresses these issues by proposing a Federated Learning (FL)based intrusion detection framework for smart cities. FL enables collaborative and privacy-preserving model training across distributed IoT devices, mitigating the need to share sensitive data centrally. By aggregating local model updates, FL ensures data privacy and distributes the computational workload, significantly reducing power consumption compared to traditional centralized systems. The proposed model leverages advanced AI techniques and is trained using the IoTID20 dataset. The Flower framework, utilizing the FedAvg algorithm, facilitates the federated learning process. Our experimental results demonstrate that the global model achieves 98% accuracy, with individual clients achieving accuracies of around 85% to 98%. This approach provides continuous learning mechanisms, anomaly detection, and ensemble learning capabilities, enhancing the resilience of federated intrusion detection systems against emerging threats and adversarial attacks. This research systematically investigates the application of federated learning for intrusion detection in smart city networks, addressing key challenges and advancing the state-of-the-art in decentralized cybersecurity solutions. The proposed framework offers a robust, scalable, and privacyco
暂无评论