Decentralized Anonymous Payment Systems (DAP), often known as cryptocurrencies, stand out as some of the most innovative and successful applications on the blockchain. These systems have garnered significant attention...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
The post-processing rendered sequences improves the quality of the sequences and shortens the time of the rendering phase. However, most of the current post-processing methods for sequences are suitable for video. Dir...
详细信息
Variational Autoencoders (VAEs) have gained popularity as one of the main approaches for generating diverse and high-quality synthetic images. This study examines the suitability of evaluation metrics, specifically In...
详细信息
The integration of artificial intelligence in agriculture has revolutionized farming practices, enhancing crop yields and resource efficiency. However, existing machine learning systems primarily focus on livestock, o...
详细信息
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mech...
详细信息
The low-intensity attack flows used by Crossfire attacks are hard to distinguish from legitimate *** methods to identify the malicious flows in Crossfire attacks are rerouting,which is based on *** these existing mechanisms,the identification of malicious flows depends on the IP ***,the IP address is easy to be changed by *** the IP address,the certificate ismore challenging to be tampered with or ***,the traffic trend in the network is towards *** certificates are popularly utilized by IoT devices for authentication in encryption *** proposed a new way to verify certificates for resource-constrained IoT devices by using the SDN *** on DTLShps,the SDN controller can collect statistics on *** this paper,we proposeCertrust,a framework based on the trust of certificates,tomitigate the Crossfire attack by using SDN for *** goal is ***,the trust model is built based on the Bayesian trust system with the statistics on the participation of certificates in each Crossfire ***,the forgetting curve is utilized instead of the traditional decay method in the Bayesian trust system for achieving a moderate decay ***,for detecting the Crossfire attack accurately,a method based on graph connectivity is ***,several trust-based routing principles are proposed tomitigate the Crossfire *** principles can also encourage users to use certificates in *** performance evaluation shows that Certrust is more effective in mitigating the Crossfire attack than the traditional rerouting ***,our trust model has a more appropriate decay rate than the traditional methods.
Multiplayer Online Battle Arena (MOBA) games currently dominate the esports landscape, offering a concrete and vivid embodiment for team comparisons, where accurately predicting the winning team is both important and ...
详细信息
Aspect-based sentiment analysis (ABSA) is a natural language processing (NLP) technique to determine the various sentiments of a customer in a single comment regarding different aspects. The increasing online data con...
详细信息
Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for e...
Existing self-knowledge distillation (Self-KD) solutions usually focus on transferring historical predictions of individual instances to the current network. However, this approach tends to create overconfidence for easy instances and underconfidence for hard instances. The widely used temperature-based strategies to smooth or sharpen the predicted distributions can lead to inconsistencies across instances, causing sensitivity issues. To address this, our approach views a queue of instances as an ensemble rather than treating each instance independently. We propose a novel method that distills historical knowledge from a dimensional perspective, utilizing intra class characteristics and interclass relationships within each ensemble. First, we align each dimension distribution from the current network to the historical output. Second, we ensure each dimension is closer to similar dimensions than dissimilar ones, maintaining consistent attitudes from present and historical perspectives. Our insights reveal that distilling historical knowledge from a dimensional perspective is more effective than the traditional instance-based approach, with potential applications in related tasks. Empirical results on three famous datasets and various network architectures demonstrate the superiority of our proposed method. Our code is available at https://***/WenkeHuang/DimSelfKD.
This paper situates itself within the broader medical imaging field, focusing on applying generative modelling techniques for anomaly detection in retinal images. Given the complexity of retinal structures, detecting ...
详细信息
暂无评论