Given a Social Network how to select a small number of influential users to maximize the influence in the network has been studied extensively in the past two decades and formally referred to as the Influence Maximiza...
详细信息
Existing learning models partition the generated representations using hyperplanes which form well defined groups of similar embeddings that is uniquely mapped to a particular class. However, in practical applications...
详细信息
Neural network-based encoder and decoder are one of the emerging techniques for image compression. To improve the compression rate, these models use a special module called the quantizer that improves the entropy of t...
详细信息
Ontologies have been increasingly used in designing access control policies in Internet of Things (IoT) systems. Machine Learning (ML) has been extensively used to identify patterns from existing data. Trained ML mode...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and se...
详细信息
Due to the importance of Critical Infrastructure(Cl)in a nation's economy,they have been lucrative targets for cyber *** critical infrastructures are usually Cyber-Physical Systems such as power grids,water,and sewage treatment facilities,oil and gas pipelines,*** recent times,these systems have suffered from cyber attacks numer-ous *** have been developing cyber security solutions for Cls to avoid lasting *** to standard frameworks,cyber security based on identification,protection,detection,response,and recovery are at the core of these *** of an ongoing attack that escapes standard protection such as firewall,anti-virus,and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the ***,anomaly detection in physical dynamics proves an effective means to implement *** is one example of anomaly detection in the sensor/actuator data,representing such systems physical *** present EPASAD,which improves the detection technique used in PASAD to detect these micro-stealthy attacks,as our experiments show that PASAD's spherical boundary-based detection fails to *** method EPASAD overcomes this by using Ellipsoid boundaries,thereby tightening the boundaries in various dimen-sions,whereas a spherical boundary treats all dimensions *** validate EPASAD using the dataset produced by the TE-process simulator and the C-town *** results show that EPASAD improves PASAD's average recall by 5.8%and 9.5%for the two datasets,respectively.
The Ethereum blockchain platform has witnessed a surge in crypto-cybercrimes, particularly phishing attacks, resulting in significant financial losses. Analyzing the Ethereum transaction network to detect phishing use...
详细信息
Emails encounter many types of cyber-attacks and email spoofing is one of the most common and challenging investigation problems. This paper identifies spoofing-based email attacks in an organization by analyzing rece...
详细信息
Fruit categorization presents a significant challenge due to the diverse range of fruit types and their similarities in color, shape, size, and structure. This challenge is addressed in this research by proposing a mu...
详细信息
One of the main goals of sentiment analysis is to analyze human perception to continuously adapt to each person’s demands. The information gathered is structured to understand the mood or emotional tone of the review...
详细信息
Real-time crowd monitoring plays a pivotal role in effectively managing public spaces and ensuring safety. This study investigates the fusion of IoT devices and the YOLO object detection model to accurately count crow...
详细信息
暂无评论