In this research, a huge dataset of lung cancer images is processed using advanced image processing techniques gathered from different medical establishments. Images will be edited and color profiles retouched from or...
详细信息
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this lett...
详细信息
Dear Editor,Dummy attack(DA), a deep stealthy but impactful data integrity attack on power industrial control processes, is recently recognized as hiding the corrupted measurements in normal measurements. In this letter, targeting a more practical case, we aim to detect the oneshot DA, with the purpose of revealing the DA once it is ***, we first formulate an optimization problem to generate one-shot DAs. Then, an unsupervised data-driven approach based on a modified local outlier factor(MLOF) is proposed to detect them.
The Vision Transformer (ViT) model serves as a powerful model to capture and comprehend global information, particularly when trained on extensive datasets. Conversely, the Convolutional Neural Network (CNN) model is ...
详细信息
Day by day cardio vascular disease death cases increasing. It mainly affects the human heart and blood vessels and it is difficult to diagnosis it. In this paper various machine learning algorithm is used to predict t...
详细信息
Nowadays, people spend a lot of time in travel, and road safety has become an important area of research. As a result, self-driving cars have been gaining popularity in recent years because they have a lot of benefits...
详细信息
The monolithic network architectures are used in Bitcoin and other big cryptos. Different hierarchical ways to protect the decentralized blockchain have been discussed to improve its usability. However, no debate in t...
详细信息
Industrial communication protocols are used by SCADA (supervising control and data acquisition) networks and Industrial Control Systems (ICS) to enhance their functionality. Modbus is an example of an application prot...
详细信息
This article deeply dives into a shift in document security by introducing innovative authentication measures. Conventional digital signature methods are less secure and can easily be forged. Our research explores the...
详细信息
Password-based authentication is a widely used method to ensure security and privacy in computer applications. However, the selection of weak passwords and insecure input methods by users is considered the 'weakes...
详细信息
Semantic Change Detection (SCD) in Remote Sensing Images (RSI) aims to identify changes in the type of Land Cover/Land Use (LCLU). The "from-to" information of the acquired image has more profound practical ...
详细信息
暂无评论