With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditi...
详细信息
With the continual deployment of power-electronics-interfaced renewable energy resources,increasing privacy concerns due to deregulation of electricity markets,and the diversification of demand-side activities,traditional knowledge-based power system dynamic modeling methods are faced with unprecedented ***-driven modeling has been increasingly studied in recent years because of its lesser need for prior knowledge,higher capability of handling large-scale systems,and better adaptability to variations of system operating *** paper discusses about the motivations and the generalized process of datadriven modeling,and provides a comprehensive overview of various state-of-the-art techniques and *** also comparatively presents the advantages and disadvantages of these methods and provides insight into outstanding challenges and possible research directions for the future.
Nowadays, we are faced with a huge amount of private data generated in different ecosystems, including the Internet of Things, social networks, peer-to-peer networks, and e-commerce, to mention a few. The performance ...
详细信息
In the realm of IoT-enabled surveillance systems, drones play a pivotal role in detecting and tracking suspects within defined areas. However, a significant challenge arises when a single drone identifies multiple sus...
详细信息
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resou...
详细信息
Traditional auto-scaling approaches are conceived as reactive automations,typically triggered when predefined thresholds are breached by resource consumption *** such rules at scale is cumbersome,especially when resources require non-negligible time to be *** paper introduces an architecture for predictive cloud operations,which enables orchestrators to apply time-series forecasting techniques to estimate the evolution of relevant metrics and take decisions based on the predicted state of the *** this way,they can anticipate load peaks and trigger appropriate scaling actions in advance,such that new resources are available when *** proposed architecture is implemented in OpenStack,extending the monitoring capabilities of Monasca by injecting short-term forecasts of standard *** use our architecture to implement predictive scaling policies leveraging on linear regression,autoregressive integrated moving average,feed-forward,and recurrent neural networks(RNN).Then,we evaluate their performance on a synthetic workload,comparing them to those of a traditional *** assess the ability of the different models to generalize to unseen patterns,we also evaluate them on traces from a real content delivery network(CDN)*** particular,the RNN model exhibites the best overall performance in terms of prediction error,observed client-side response latency,and forecasting *** implementation of our architecture is open-source.
Smishing is a type of social engineering attack that involves sending fraudulent SMS messages to trick recipients into revealing sensitive information. In recent years, it has become a significant threat to mobile com...
详细信息
The security of ad hoc networks continues to pose a major challenge in today's digital age. Threatened by unscrupulous users, especially in decentralized and open architectures, ad-hoc vehicular networks make prot...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but...
详细信息
Federated learning came into being with the increasing concern of privacy security,as people’s sensitive information is being exposed under the era of big *** is an algorithm that does not collect users’raw data,but aggregates model parameters from each client and therefore protects user’s ***,due to the inherent distributed nature of federated learning,it is more vulnerable under attacks since users may upload malicious data to break down the federated learning *** addition,some recent studies have shown that attackers can recover information merely from ***,there is still lots of room to improve the current federated learning *** this survey,we give a brief review of the state-of-the-art federated learning techniques and detailedly discuss the improvement of federated *** open issues and existing solutions in federated learning are *** also point out the future research directions of federated learning.
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelli...
详细信息
One of the biggest dangers to society today is terrorism, where attacks have become one of the most significantrisks to international peace and national security. Big data, information analysis, and artificial intelligence (AI) havebecome the basis for making strategic decisions in many sensitive areas, such as fraud detection, risk management,medical diagnosis, and counter-terrorism. However, there is still a need to assess how terrorist attacks are related,initiated, and detected. For this purpose, we propose a novel framework for classifying and predicting terroristattacks. The proposed framework posits that neglected text attributes included in the Global Terrorism Database(GTD) can influence the accuracy of the model’s classification of terrorist attacks, where each part of the datacan provide vital information to enrich the ability of classifier learning. Each data point in a multiclass taxonomyhas one or more tags attached to it, referred as “related tags.” We applied machine learning classifiers to classifyterrorist attack incidents obtained from the GTD. A transformer-based technique called DistilBERT extracts andlearns contextual features from text attributes to acquiremore information from text data. The extracted contextualfeatures are combined with the “key features” of the dataset and used to perform the final classification. Thestudy explored different experimental setups with various classifiers to evaluate the model’s performance. Theexperimental results show that the proposed framework outperforms the latest techniques for classifying terroristattacks with an accuracy of 98.7% using a combined feature set and extreme gradient boosting classifier.
In this paper, we present a novel hypothesis testing framework to model an attacker's decision-making during the reconnaissance phase and employ the framework to design strategic deception strategies that can prov...
详细信息
Predicting today's utilization of energy will determine how powerful it is in the future. Generators can change their output by foreseeing the demand for electricity. As a result, shortages or overproduction are p...
详细信息
暂无评论