Plant diseases significantly threaten global food security and economic stability by reducing crop yields, increasing production costs, and exacerbating food shortages. Early and precise detection of plant diseases is...
详细信息
Distributed Denial of Service (DDoS) attacks pose a significant threat to network infrastructures, leading to service disruptions and potential financial losses. In this study, we propose an ensemble-based approach fo...
详细信息
This paper explores the concept of isomorphism in cellular automata (CAs), focusing on identifying and understanding isomorphic relationships between distinct CAs. A cellular automaton (CA) is said to be isomorphic to...
详细信息
Classifying textual data is crucial in the expanding digital landscape, especially for underrepresented cursive languages like Urdu, which pose unique challenges due to their intricate linguistic features and vast dig...
详细信息
Due to the proliferation of electronic devices, there is an ongoing creation of new data for each and every human. There is an ongoing debate about data because of the trade off that happens: security of the data vers...
详细信息
作者:
A.E.M.EljialyMohammed Yousuf UddinSultan AhmadDepartment of Information Systems
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabia Department of Computer Science
College of Computer Engineering and SciencesPrince Sattam Bin Abdulaziz UniversityAlkharjSaudi Arabiaand also with University Center for Research and Development(UCRD)Department of Computer Science and EngineeringChandigarh UniversityPunjabIndia
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks i...
详细信息
Intrusion detection systems (IDSs) are deployed to detect anomalies in real time. They classify a network’s incoming traffic as benign or anomalous (attack). An efficient and robust IDS in software-defined networks is an inevitable component of network security. The main challenges of such an IDS are achieving zero or extremely low false positive rates and high detection rates. Internet of Things (IoT) networks run by using devices with minimal resources. This situation makes deploying traditional IDSs in IoT networks unfeasible. Machine learning (ML) techniques are extensively applied to build robust IDSs. Many researchers have utilized different ML methods and techniques to address the above challenges. The development of an efficient IDS starts with a good feature selection process to avoid overfitting the ML model. This work proposes a multiple feature selection process followed by classification. In this study, the Software-defined networking (SDN) dataset is used to train and test the proposed model. This model applies multiple feature selection techniques to select high-scoring features from a set of features. Highly relevant features for anomaly detection are selected on the basis of their scores to generate the candidate dataset. Multiple classification algorithms are applied to the candidate dataset to build models. The proposed model exhibits considerable improvement in the detection of attacks with high accuracy and low false positive rates, even with a few features selected.
In our day-To-day life, emotion plays an essential role in decision-making and human interaction. For many years, psychologists have been trying to develop many emotional models to explain the human emotional or affec...
详细信息
ChatGPT, an advanced language model powered by artificial intelligence, has emerged as a transformative tool in the field of education. This article explores the potential of ChatGPT in revolutionizing learning and co...
详细信息
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concer...
详细信息
Large-scale neural networks-based federated learning(FL)has gained public recognition for its effective capabilities in distributed ***,the open system architecture inherent to federated learning systems raises concerns regarding their vulnerability to potential *** attacks turn into a major menace to federated learning on account of their concealed property and potent destructive *** altering the local model during routine machine learning training,attackers can easily contaminate the global *** detection and aggregation solutions mitigate certain threats,but they are still insufficient to completely eliminate the influence generated by ***,federated unlearning that can remove unreliable models while maintaining the accuracy of the global model has become a *** some existing federated unlearning approaches are rather difficult to be applied in large neural network models because of their high computational ***,we propose SlideFU,an efficient anti-poisoning attack federated unlearning *** primary concept of SlideFU is to employ sliding window to construct the training process,where all operations are confined within the *** design a malicious detection scheme based on principal component analysis(PCA),which calculates the trust factors between compressed models in a low-cost way to eliminate unreliable *** confirming that the global model is under attack,the system activates the federated unlearning process,calibrates the gradients based on the updated direction of the calibration *** on two public datasets demonstrate that our scheme can recover a robust model with extremely high efficiency.
Purpose-The Internet of Things(IoT)cloud platforms provide end-to-end solutions that integrate various capabilities such as application development,device and connectivity management,data storage,data analysis and dat...
详细信息
Purpose-The Internet of Things(IoT)cloud platforms provide end-to-end solutions that integrate various capabilities such as application development,device and connectivity management,data storage,data analysis and data *** high use of these platforms results in their huge availability provided by different ***,choosing the optimal IoT cloud platform to develop IoT applications successfully has become *** key purpose of the present study is to implement a hybrid multi-attribute decision-making approach(MADM)to evaluate and select IoT cloud ***/methodology/approach-The optimal selection of the IoT cloud platforms seems to be dependent on multiple ***,the optimal selection of IoT cloud platforms problem is modeled as a MADM problem,and a hybrid approach named neutrosophic fuzzy set-Euclidean taxicab distance-based approach(NFS-ETDBA)is implemented to solve the ***-ETDBA works on the calculation of assessment score for each alternative,*** cloud platforms,by combining two different measures:Euclidean and taxicab ***-A case study to illustrate the working of the proposed NFS-ETDBA for optimal selection of IoT cloud platforms is *** results obtained on the basis of calculated assessment scores depict that“Azure IoT suite”is the most preferable IoT cloud platform,whereas“Salesman IoT cloud”is the least ***/value-The proposed NFS-ETDBA methodology for the IoT cloud platform selection is implemented for the first time in this *** is highly capable of handling the large number of alternatives and the selection attributes involved in any decision-making ***,the use of fuzzy set theory(FST)makes it very easy to handle the impreciseness that may occur during the data collection through a questionnaire from a group of experts.
暂无评论