False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad *** FDIA detection methods usually employ complex neural networkmod...
详细信息
False data injection attack(FDIA)is an attack that affects the stability of grid cyber-physical system(GCPS)by evading the detecting mechanism of bad *** FDIA detection methods usually employ complex neural networkmodels to detect FDIA ***,they overlook the fact that FDIA attack samples at public-private network edges are extremely sparse,making it difficult for neural network models to obtain sufficient samples to construct a robust detection *** address this problem,this paper designs an efficient sample generative adversarial model of FDIA attack in public-private network edge,which can effectively bypass the detectionmodel to threaten the power grid system.A generative adversarial network(GAN)framework is first constructed by combining residual networks(ResNet)with fully connected networks(FCN).Then,a sparse adversarial learning model is built by integrating the time-aligned data and normal data,which is used to learn the distribution characteristics between normal data and attack data through iterative ***,we introduce a Gaussian hybrid distributionmatrix by aggregating the network structure of attack data characteristics and normal data characteristics,which can connect and calculate FDIA data with normal ***,efficient FDIA attack samples can be sequentially generated through interactive adversarial *** simulation experiments are conducted with IEEE 14-bus and IEEE 118-bus system data,and the results demonstrate that the generated attack samples of the proposed model can present superior performance compared to state-of-the-art models in terms of attack strength,robustness,and covert capability.
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where ...
详细信息
The security of digital images transmitted via the Internet or other public media is of the utmost *** encryption is a method of keeping an image secure while it travels across a non-secure communication medium where it could be intercepted by unauthorized *** study provides an approach to color image encryption that could find practical use in various *** proposed method,which combines four chaotic systems,employs singular value decomposition and a chaotic sequence,making it both secure and *** unified average change intensity,the number of pixels’change rate,information entropy analysis,correlation coefficient analysis,compression friendliness,and security against brute force,statistical analysis and differential attacks are all used to evaluate the algorithm’s *** a thorough investigation of the experimental data,it is concluded that the proposed image encryption approach is secure against a wide range of attacks and provides superior compression friendliness when compared to chaos-based alternatives.
This paper primarily introduces our approach in the 2nd MiGA-IJCAI Challenge Track 1, which focuses on micro-gesture recognition. The micro-gesture dataset has the characteristics of small action amplitude, short dura...
详细信息
In Intelligent Transportation Systems (ITS) and smart cities, Vehicular Ad hoc Networks (VANETs) are vital but face challenges due to their dynamic topology, making traditional IP-based content retrieval impractical. ...
详细信息
High fan-out requests are prevalent in systems employing multi-tier architectures. These requests are divided into several sub-requests for parallel processing. However, a high fan-out request must await all sub-reque...
详细信息
This paper suggests a new mechanism from deep learning concept for personalised therapy in Clinical Decision Support Systems (CDSS). Basically, the texts used for the observation are acquired from the standard data so...
详细信息
Video steganography plays an important role in secret communication that conceals a secret video in a cover video by perturbing the value of pixels in the cover *** is the first and foremost requirement of any stegano...
详细信息
Video steganography plays an important role in secret communication that conceals a secret video in a cover video by perturbing the value of pixels in the cover *** is the first and foremost requirement of any steganographic *** by the fact that human eyes perceive pixel perturbation differently in different video areas,a novel effective and efficient Deeply‐Recursive Attention Network(DRANet)for video steganography to find suitable areas for information hiding via modelling spatio‐temporal attention is *** DRANet mainly contains two important components,a Non‐Local Self‐Attention(NLSA)block and a Non‐Local Co‐Attention(NLCA)***,the NLSA block can select the cover frame areas which are suitable for hiding by computing the correlations among inter‐and intra‐cover *** NLCA block aims to effectively produce the enhanced representations of the secret frames to enhance the robustness of the model and alleviate the influence of different areas in the secret ***,the DRANet reduces the model parameters by performing similar operations on the different frames within an input video *** results show the proposed DRANet achieves better performance with fewer parameters than the state‐of‐the‐art competitors.
Artificial Intelligence, including machine learning and deep convolutional neural networks (DCNNs), relies on complex algorithms and neural networks to process and analyze data. DCNNs for visual recognition often requ...
详细信息
Healthcare 4.0 is considered to be the most resilient technology with the integration of Internet of Things (IoT), Artificial Intelligence (AI), and 5G wireless communication. These Internet-enabled devices compile hu...
详细信息
Climate change poses a critical global challenge, requiring urgent action to mitigate its impacts. One of the most effective ways to address this issue is by empowering individuals to make sustainable lifestyle choice...
详细信息
暂无评论