Conventional classification approaches for EEG- based emotion recognition cannot often adapt to different domains, such as cross-subject or cross-dataset scenarios, leading to poor performance. To handle this challeng...
详细信息
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and *** to ...
详细信息
Emerging mobile edge computing(MEC)is considered a feasible solution for offloading the computation-intensive request tasks generated from mobile wireless equipment(MWE)with limited computational resources and *** to the homogeneity of request tasks from one MWE during a longterm time period,it is vital to predeploy the particular service cachings required by the request tasks at the MEC *** this paper,we model a service caching-assisted MEC framework that takes into account the constraint on the number of service cachings hosted by each edge server and the migration of request tasks from the current edge server to another edge server with service caching required by ***,we propose a multiagent deep reinforcement learning-based computation offloading and task migrating decision-making scheme(MBOMS)to minimize the long-term average weighted *** proposed MBOMS can learn the near-optimal offloading and migrating decision-making policy by centralized training and decentralized *** and comprehensive simulation results reveal that our proposed MBOMS can converge well after training and outperforms the other five baseline algorithms.
Colorectal Cancer (CRC) is a form of cancer that develops in the colon or rectum. It is also referred as bowel cancer, colon cancer, or rectal cancer. CRC has become the second most prevailing sort of cancer in the hu...
详细信息
Accuracy of computation for Sommerfeld integrals is examined for applications to microstrip geometries. In a numerical approach proposed earlier, the influence of the singularities in the integrand is obviated by defo...
详细信息
This study presents the application of Faster RCNN, a popular Region Based Convolutional Neural Network, for detecting hyperbolic patterns in Ground Penetrating Radar (GPR) images. GPR is an important tool for subsurf...
详细信息
Transport systems are fundamental to supporting economic growth, and the need for smarter, safer, more efficient and climate neutral transport systems continues to grow. Maintenance and operation of transport infrastr...
详细信息
Operating Systems enforce logical isolation using abstractions such as processes, containers, and isolation tech-nologies to protect a system from malicious or buggy code. In this paper, we show new types of side chan...
详细信息
ISBN:
(数字)9798331522360
ISBN:
(纸本)9798331522377
Operating Systems enforce logical isolation using abstractions such as processes, containers, and isolation tech-nologies to protect a system from malicious or buggy code. In this paper, we show new types of side channels through the file system that break this logical isolation. The file system plays a critical role in the operating system, managing all I/O activities between the application layer and the physical storage device. We observe that the file system implementation is shared, leading to timing leakage when using common I/O system calls. Specifically, we found that modern operating systems take advantage of any flush operation (which saves cached blocks in memory to the SSD or disk) to flush all of the I/O buffers, even those used by other isolation domains. Thus, by measuring the delay of syncfs, the attacker can infer the I/O behavior of victim programs. We then demonstrate a syncfs covert channel attack on multiple file systems, including both Linux native file systems and the Windows file system, achieving a maximum bandwidth of 5 Kbps with an error rate of 0.15% on Linux and 7.6 Kbps with an error rate of 1.9% on Windows. In addition, we construct three side-channel attacks targeting both Linux and Android devices. On Linux devices, we implement a website fingerprinting attack and a video fingerprinting attack by tracking the write patterns of temporary buffering files. On Android devices, we design an application fingerprinting attack that leaks application write patterns during boot-up. The attacks achieve over 90% F1 score, precision, and recall. Finally, we demonstrate that these attacks can be exploited across containers implementing a container detection technique and a cross-container covert channel attack.
The growing integration of Distributed Energy Resources (DERs) into modern power grids, managed via DER Management Systems (DERMS), has introduced significant cybersecurity challenges. Communication vulnerabilities in...
详细信息
ISBN:
(数字)9798331520182
ISBN:
(纸本)9798331520199
The growing integration of Distributed Energy Resources (DERs) into modern power grids, managed via DER Management Systems (DERMS), has introduced significant cybersecurity challenges. Communication vulnerabilities in DERMS architecture create opportunities for adversarial attacks, such as Man-in-the-Middle (MITM), that intercept and manipulate critical data flows, disrupting grid operations and compromising reliability. This paper investigates MITM attacks targeting three critical nodes in DER-DERMS communication: (i) DER gateway routers, (ii) inter-router pathways, and (iii) DERMS gateway routers. To analyze these vulnerabilities, we developed CPS-DERMS, a multi-co-simulation hardware-in-the-loop testbed integrating grid-side simulations with OPAL-RT, large-scale cyber simulations using NS-3, and an indige-nous Python-based DERMS platform. The study demonstrates innovative strategies for executing MITM attacks, including maintaining payload integrity and bypassing detection mechanisms, while highlighting the critical vulnerabilities within DER-DERMS communication systems. We considered a real utility's DER-integrated distribution grid as a case study. Experimental results reveal that MITM attacks can cause overvoltages, reactive power imbalances, and increased tap-changer operations, significantly degrading power quality and grid reliability.
Nowadays, unmanned aerial vehicles (UAVs) are increasingly utilized in search and rescue missions, a trend driven by technological advancements, including enhancements in automation, avionics, and the reduced cost of ...
详细信息
Imitation learning mitigates the resource-intensive nature of learning policies from scratch by mimicking expert behavior. While existing methods can accurately replicate expert demonstrations, they often exhibit unpr...
详细信息
ISBN:
(数字)9798350384574
ISBN:
(纸本)9798350384581
Imitation learning mitigates the resource-intensive nature of learning policies from scratch by mimicking expert behavior. While existing methods can accurately replicate expert demonstrations, they often exhibit unpredictability in unexplored regions of the state space, thereby raising major safety concerns when facing perturbations. We propose SNDS, an imitation learning approach aimed at efficient training of scalable neural policies while formally ensuring global stability. SNDS leverages a neural architecture that enables the joint training of the policy and its associated Lyapunov candidate to ensure global stability throughout the learning process. We validate our approach through extensive simulations and deploy the trained policies on a real-world manipulator arm. The results confirm SNDS’s ability to address instability, accuracy, and computational intensity challenges highlighted in the literature, positioning it as a promising solution for scalable and stable policy learning in complex environments.
暂无评论