Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by e...
详细信息
Industrial Internet of Things(IIoT)systems depend on a growing number of edge devices such as sensors,controllers,and robots for data collection,transmission,storage,and *** kind of malicious or abnormal function by each of these devices can jeopardize the security of the entire ***,they can allow malicious software installed on end nodes to penetrate the *** paper presents a parallel ensemble model for threat hunting based on anomalies in the behavior of IIoT edge *** proposed model is flexible enough to use several state-of-the-art classifiers as the basic learner and efficiently classifies multi-class anomalies using the Multi-class AdaBoost and majority *** evaluations using a dataset consisting of multi-source normal records and multi-class anomalies demonstrate that our model outperforms existing approaches in terms of accuracy,F1 score,recall,and precision.
This study applies single-valued neutrosophic sets, which extend the frameworks of fuzzy and intuitionistic fuzzy sets, to graph theory. We introduce a new category of graphs called Single-Valued Heptapartitioned Neut...
详细信息
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This article aims to develop a color image encryption algorithm that enhanc...
详细信息
Vehicle to Everything (V2X) is a core 5G technology. V2X and its enabler, Device-to-Device (D2D), are essential for the Internet of Things (IoT) and the Internet of Vehicles (IoV). V2X enables vehicles to communicate ...
详细信息
作者:
Jiang, Wei-BangLiu, Xuan-HaoZheng, Wei-LongLu, Bao-LiangShanghai Jiao Tong University
Center for Brain-Like Computing and Machine Intelligence Department of Computer Science and Engineering Key Laboratory of Shanghai Education Commission for Intelligent Interaction and Cognitive Engineering Brain Science and Technology Research Center Shanghai200240 China
Recognizing emotions from physiological signals is a topic that has garnered widespread interest, and research continues to develop novel techniques for perceiving emotions. However, the emergence of deep learning has...
详细信息
Hero drafting for multiplayer online arena (MOBA) games is crucial because drafting directly affects the outcome of a match. Both sides take turns to "ban"/"pick" a hero from a roster of approximat...
详细信息
Physical adversarial attacks can deceive deep neural networks (DNNs), leading to erroneous predictions in real-world scenarios. To uncover potential security risks, attacking the safety-critical task of person detecti...
The accurate and robust unmanned aerial vehicle(UAV)localization is significant due to the requirements of safety-critical monitoring and emergency wireless communication in hostile underground *** range-based localiz...
详细信息
The accurate and robust unmanned aerial vehicle(UAV)localization is significant due to the requirements of safety-critical monitoring and emergency wireless communication in hostile underground *** range-based localization approaches fundamentally rely on the assumption that the environment is relatively ideal,which enables a precise range for ***,radio propagation in the underground environments may be dramatically influenced by various equipments,obstacles,and ambient *** this case,inaccurate range measurements and intermittent ranging failures inevitably occur,which leads to severe localization performance *** address the challenges,a novel UAV localization scheme is proposed in this paper,which can effectively handle unreliable observations in hostile underground *** first propose an adaptive extended Kalman filter(EKF)based on the fusion of ultra-wideband(UWB)and inertial measurement unit(IMU)to detect and adjust the inaccurate range *** to deal with intermittent ranging failures,we further design the constraint condition by limiting the system ***,the auto-regressive model is proposed to implement the localization in the ranging blind areas by reconstructing the lost ***,extensive simulations have been conducted to verify the *** carry out field experiments in an underground garage and a coal mine based on P440 UWB *** show that the localization accuracy is improved by 16.9%compared with the recent methods in the hostile underground environments.
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block...
详细信息
Since transactions in blockchain are based on public ledger verification,this raises security concerns about privacy *** it will cause the accumulation of data on the chain and resulting in the low efficiency of block verification,when the whole transaction on the chain is *** order to improve the efficiency and privacy protection of block data verification,this paper proposes an efficient block verification mechanism with privacy protection based on zeroknowledge proof(ZKP),which not only protects the privacy of users but also improves the speed of data block *** is no need to put the whole transaction on the chain when verifying block *** just needs to generate the ZKP and root hash with the transaction information,then save them to the smart contract for ***,the ZKP verification in smart contract is carried out to realize the privacy protection of the transaction and efficient verification of the *** the data is validated,the buffer accepts the complete transaction,updates the transaction status in the cloud database,and packages up the ***,the ZKP strengthens the privacy protection ability of blockchain,and the smart contracts save the time cost of block verification.
It is possible to tell a lot about a person just by looking at their handwriting. The way someone writes might tell you a lot about who, they are as a person. There has been a lot of study on the possibility of deduci...
详细信息
暂无评论