Recently, neural network-based in-loop filters have been rapidly developed, effectively improving the reconstruction quality and compression efficiency in video coding. Existing deep in-loop filters typically employed...
详细信息
Mobile banking security has witnessed significant R&D attention from both financial institutions and *** is due to the growing number of mobile baking applications and their reachability and usefulness to ***,thes...
详细信息
Mobile banking security has witnessed significant R&D attention from both financial institutions and *** is due to the growing number of mobile baking applications and their reachability and usefulness to ***,these applications are also attractive prey for cybercriminals,who use a variety of malware to steal personal banking *** literature in mobile banking security requiresmany permissions that are not necessary for the application’s intended security *** this context,this paper presents a novel efficient permission identification approach for securing mobile banking(MoBShield)to detect and prevent malware.A permission-based dataset is generated for mobile banking malware detection that consists large number of malicious adware apps and benign apps to use as training *** dataset is generated from 1650 malicious banking apps of the Canadian Institute of Cybersecurity,University of New Brunswick and benign apps from Google Play.A machine learning algorithm is used to determine whether amobile banking application ismalicious based on its permission ***,an eXplainable machine learning(XML)approach is developed to improve trust by explaining the reasoning behind the algorithm’s *** evaluation tests that the approach can effectively and practically identify mobile banking malware with high precision and reduced false ***,the adapted artificial neural networks(ANN),convolutional neural networks(CNN)and XML approaches achieve a higher accuracy of 99.7%and the adapted deep neural networks(DNN)approach achieves 99.6%accuracy in comparison with the state-of-the-art *** promising results position the proposed approach as a potential tool for real-world scenarios,offering a robustmeans of identifying and thwarting malware inmobile-based banking ***,MoBShield has the potential to significantly enhance the security and trustworthiness of
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for rel...
详细信息
Intelligent Transportation Systems (ITS) generate massive amounts of Big Data through both sensory and non-sensory platforms. The data support batch processing as well as stream processing, which are essential for reliable operations on the roads and connected vehicles in ITS. Despite the immense potential of Big Data intelligence in ITS, autonomous vehicles are largely confined to testing and trial phases. The research community is working tirelessly to improve the reliability of ITS by designing new protocols, standards, and connectivity paradigms. In the recent past, several surveys have been conducted that focus on Big Data Intelligence for ITS, yet none of them have comprehensively addressed the fundamental challenges hindering the widespread adoption of autonomous vehicles on the roads. Our survey aims to help readers better understand the technological advancements by delving deep into Big Data architecture, focusing on data acquisition, data storage, and data visualization. We reviewed sensory and non-sensory platforms for data acquisition, data storage repositories for archival and retrieval of large datasets, and data visualization for presenting the processed data in an interactive and comprehensible format. To this end, we discussed the current research progress by comprehensively covering the literature and highlighting challenges that urgently require the attention of the research community. Based on the concluding remarks, we argued that these challenges hinder the widespread presence of autonomous vehicles on the roads. Understanding these challenges is important for a more informed discussion on the future of self-driven technology. Moreover, we acknowledge that these challenges not only affect individual layers but also impact the functionality of subsequent layers. Finally, we outline our future work that explores how resolving these challenges could enable the realization of innovations such as smart charging systems on the roads and data centers
Electrical signatures characteristic of complex neurological activity and neuropsychiatric disease are embedded in electroencephalography (EEG) signal data. To firmly establish new correlations between these brain ele...
详细信息
The Internet of Things(IoT)has emerged as an important future ***-Fog is a new computing paradigm that processes IoT data on servers close to the source of the *** IoT-Fog computing,resource allocation and independent...
详细信息
The Internet of Things(IoT)has emerged as an important future ***-Fog is a new computing paradigm that processes IoT data on servers close to the source of the *** IoT-Fog computing,resource allocation and independent task scheduling aim to deliver short response time services demanded by the IoT devices and performed by fog *** heterogeneity of the IoT-Fog resources and the huge amount of data that needs to be processed by the IoT-Fog tasks make scheduling fog computing tasks a challenging *** study proposes an Adaptive Firefly Algorithm(AFA)for dependent task scheduling in IoT-Fog *** proposed AFA is a modified version of the standard Firefly Algorithm(FA),considering the execution times of the submitted tasks,the impact of synchronization requirements,and the communication time between dependent *** IoT-Fog computing depends mainly on distributed fog node servers that receive tasks in a dynamic manner,tackling the communications and synchronization issues between dependent tasks is becoming a challenging *** proposed AFA aims to address the dynamic nature of IoT-Fog computing *** proposed AFA mechanism considers a dynamic light absorption coefficient to control the decrease in attractiveness over *** proposed AFA mechanism performance was benchmarked against the standard Firefly Algorithm(FA),Puma Optimizer(PO),Genetic Algorithm(GA),and Ant Colony Optimization(ACO)through simulations under light,typical,and heavy workload *** heavy workloads,the proposed AFA mechanism obtained the shortest average execution time,968.98 ms compared to 970.96,1352.87,1247.28,and 1773.62 of FA,PO,GA,and ACO,*** simulation results demonstrate the proposed AFA’s ability to rapidly converge to optimal solutions,emphasizing its adaptability and efficiency in typical and heavy workloads.
This paper proposes a Poor and Rich Squirrel Algorithm (PRSA)-based Deep Maxout network to find fraud data transactions in the credit card system. Initially, input transaction data is passed to the data transformation...
详细信息
Over recent years, virtualization has worked as the powerhouse of the data centers. To positively influence datacenter utilization, power consumption, and management, live migration presents a technique which must be ...
详细信息
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable *** predictivemodels for thyroid cancer enhan...
详细信息
In the era of advanced machine learning techniques,the development of accurate predictive models for complex medical conditions,such as thyroid cancer,has shown remarkable *** predictivemodels for thyroid cancer enhance early detection,improve resource allocation,and reduce ***,the widespread adoption of these models in clinical practice demands predictive performance along with interpretability and *** paper proposes a novel association-rule based feature-integratedmachine learning model which shows better classification and prediction accuracy than present *** study also focuses on the application of SHapley Additive exPlanations(SHAP)values as a powerful tool for explaining thyroid cancer prediction *** the proposed method,the association-rule based feature integration framework identifies frequently occurring attribute combinations in the *** original dataset is used in trainingmachine learning models,and further used in generating SHAP values *** the next phase,the dataset is integrated with the dominant feature sets identified through association-rule based *** new integrated dataset is used in re-training the machine learning *** new SHAP values generated from these models help in validating the contributions of feature sets in predicting *** conventional machine learning models lack interpretability,which can hinder their integration into clinical decision-making *** this study,the SHAP values are introduced along with association-rule based feature integration as a comprehensive framework for understanding the contributions of feature sets inmodelling the *** study discusses the importance of reliable predictive models for early diagnosis of thyroid cancer,and a validation framework of *** proposed model shows an accuracy of 93.48%.Performance metrics such as precision,recall,F1-score,and the area un
The Myers-Briggs Type Indicator (MBTI) classification is a widely utilized instrument for personality assessment. However, it frequently encounters challenges due to imbalanced data distributions across personality di...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** ...
详细信息
IoT devices rely on authentication mechanisms to render secure message *** data transmission,scalability,data integrity,and processing time have been considered challenging aspects for a system constituted by IoT *** application of physical unclonable functions(PUFs)ensures secure data transmission among the internet of things(IoT)devices in a simplified network with an efficient time-stamped *** paper proposes a secure,lightweight,cost-efficient reinforcement machine learning framework(SLCR-MLF)to achieve decentralization and security,thus enabling scalability,data integrity,and optimized processing time in IoT *** has been integrated into SLCR-MLF to improve the security of the cluster head node in the IoT platform during transmission by providing the authentication service for device-to-device *** IoT network gathers information of interest from multiple cluster members selected by the proposed *** addition,the software-defined secured(SDS)technique is integrated with SLCR-MLF to improve data integrity and optimize processing time in the IoT *** analysis shows that the proposed framework outperforms conventional methods regarding the network’s lifetime,energy,secured data retrieval rate,and performance *** enabling the proposed framework,number of residual nodes is reduced to 16%,energy consumption is reduced by up to 50%,almost 30%improvement in data retrieval rate,and network lifetime is improved by up to 1000 msec.
暂无评论