The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
Image compression is a class of algorithms that reduces the storage space requirement for a digital image. Lossy image compression techniques achieve higher compression but the visual quality of the decompressed image...
详细信息
Recent years have witnessed many advancements in the applications of 3D textured meshes. As the demand continues to rise, evaluating the perceptual quality of this new type of media content becomes crucial for quality...
详细信息
Computational Design approaches facilitate the generation of typographic design, but evaluating these designs remains a challenging task. In this paper, we propose a set of heuristic metrics for typographic design eva...
详细信息
作者:
Moschella, LucaGLADIA research lab
Department of Computer Science Faculty of Information Engineering Informatics and Statistics Italy
As NNs (Neural Networks) permeate various scientific and industrial domains, understanding the universality and reusability of their representations becomes crucial. At their core, these networks create intermediate n...
详细信息
As NNs (Neural Networks) permeate various scientific and industrial domains, understanding the universality and reusability of their representations becomes crucial. At their core, these networks create intermediate neural representations, indicated as latent spaces, of the input data and subsequently leverage them to perform specific downstream tasks. This dissertation focuses on the universality and reusability of neural representations. Do the latent representations crafted by a NN remain exclusive to a particular trained instance, or can they generalize across models, adapting to factors such as randomness during training, model architecture, or even data domain? This adaptive quality introduces the notion of Latent Communication – a phenomenon that describes when representations can be unified or reused across neural spaces. A salient observation from our research is the emergence of similarities in latent representations, even when these originate from distinct or seemingly unrelated NNs. By exploiting a partial correspondence between the two data distributions that establishes a semantic link, we found that these representations can either be projected into a universal representation (Moschella*, Maiorca*, et al., 2023), coined as Relative Representation, or be directly translated from one space to another (Maiorca* et al., 2023). Intriguingly, this holds even when the transformation relating the spaces is unknown (Cannistraci, Moschella, Fumero, et al., 2024) and when the semantic bridge between them is minimal (Cannistraci, Moschella, Maiorca, et al., 2023). Latent Communication allows for a bridge between independently trained NN, irrespective of their training regimen, architecture, or the data modality they were trained on – as long as the data semantic content stays the same (e.g., images and their captions). This holds true for both generation, classification and retrieval downstream tasks;in supervised, weakly supervised, and unsupervised settings;and
Context: Technical debt (TD) is a metaphor that is used to communicate the consequences of poor software development practices to non-technical stakeholders. In recent years, it has gained significant attention in agi...
详细信息
In recent years, cities as they adopt smart technology in an ever-evolving technological environment, face new complex threats and security challenges. Threats that affect the privacy of citizens but often impact crit...
详细信息
ISBN:
(纸本)9798400716263
In recent years, cities as they adopt smart technology in an ever-evolving technological environment, face new complex threats and security challenges. Threats that affect the privacy of citizens but often impact critical infrastructure of a smart city, creating sustainability risks. Hence, the cyber security incidents have multiplied, allowing these threats to disrupt the functioning of a smart digitized ecosystem. In addition to these challenges, the smart cities have been developed like a technological complex puzzle with different interconnected sensors and software. This Internet of Things (IoT) – based infrastructure of a smart city includes different smart grid systems which will be studied. This paper highlights the vulnerabilities of a digital ecosystem in a smart city environment and addresses the security and privacy issues regarding the IoT-based infrastructure and cloud computing. We also present future trends on blockchain technology and we focus on the presentation of a zero trust blockchain-security framework (ZTF) which can be developed to mitigate the urban surface area of vulnerability exploitation and security risks.
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., so...
详细信息
ISBN:
(数字)9798350364101
ISBN:
(纸本)9798350364118
Heart disease is the highest cause of death in the world. Arrhythmia is an abnormality in the rhythm of the heartbeat. The heart beats too fast, too slow, or irregularly. Arrhythmias are not always dangerous, e.g., someone who does excessive activity has a faster heart rate. Then, a diagnosis is needed to classify arrhythmias. One method used is ECG (Electrocardiogram) signal analysis. The ECG signal consists of P, QRS Complex, and T waves. The morphology of the QRS is used for arrhythmia classification. Currently, cardiologists analyze ECG signals by observing directly. This method is depending on the level of expertise of the cardiologist. Previous research classified arrhythmias based on the QRS morphology from a single ECG lead. As 12-lead ECG devices have now become standard in ECG examinations because abnormalities can be observed from multiple angles. This study proposes the classification of arrhythmias in 12-lead ECG signals based on the morphology of QRS complex waves using a deep learning 1-dimensional Convolutional Neural Network. The output of deep learning is the classification of arrhythmias into four classes, namely: Normal, Right Bundle Branch Block, Premature Ventricular Contraction, and Atrial Premature Beat. The outcome of the proposed system is that each QRS segment is used as input for deep learning, which can improve classification performance compared to the classification carried out by each lead. The experimental results show the method can be done well, with an average Accuracy, Precision, Sensitivity, and F1-Score were 98.8%, 99.2%, 99.2%, and 99.2%, respectively.
Security datasets often exhibit significant imbalances that can introduce bias during model training, diminish sensitivity to actual attacks, and lead to a substantial number of false negatives, potentially overlookin...
详细信息
ISBN:
(数字)9798350363104
ISBN:
(纸本)9798350363111
Security datasets often exhibit significant imbalances that can introduce bias during model training, diminish sensitivity to actual attacks, and lead to a substantial number of false negatives, potentially overlooking real threats. This is particularly evident in the highly skewed distribution of the UNSW-NB18 Bot-IoT dataset. To mitigate these issues, this study proposes implementing either Random Oversampling (ROS) or Synthetic Minority Oversampling (SMOTE) in conjunction with five ensemble algorithms to develop models for predicting intrusions in the Internet of Things networks. The results show that incorporating these methods with ensemble learners significantly improves model accuracy by 1 % to 4 % across the four algorithms compared to their absence. In addition, there were dramatic increases in precision, recall, and F1-score, achieving values between 95% and 100%.
Loosely coupled microservices have emerged as a new paradigm for efficiently deploying applications in clouds. However, dynamic resource allocation in clouds introduces significant challenges to microservice applicati...
详细信息
暂无评论