The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the e...
详细信息
The exponential growth in the development of smartphones and handheld devices is permeated due to everyday activities i.e.,games applications,entertainment,online banking,social network sites,etc.,and also allow the end users to perform a variety of *** of activities,mobile devices attract cybercriminals to initiate an attack over a diverse range of malicious activities such as theft of unauthorized information,phishing,spamming,Distributed Denial of Services(DDoS),and malware *** applications are a type of harmful attack that can be used to launch malicious activities and has become a significant threat in the research area.A botnet is a collection of infected devices that are managed by a botmaster and communicate with each other via a command server in order to carry out malicious *** the rise in malicious attacks,detecting botnet applications has become more ***,it is essential to investigate mobile botnet attacks to uncover the security issues in severe financial and ethical damages caused by a massive coordinated command *** state of the art,various solutions were provided for the detection of botnet applications,but in general,the researchers suffer various techniques of machine learning-based methods with static features which are usually ineffective when obfuscation techniques are used for the detection of botnet *** this paper,we propose an approach by exploring the concept of a deep learning-based method and present a well-defined Convolutional Neural Network(CNN)*** the visualization approach,we obtain the colored images through byte code files of applications and perform an *** analysis of the results of an experiment,we differentiate the performance of the model from other existing research ***,our method outperforms with 94.34%accuracy,92.9%of precision,and 92%of recall.
While deep learning excels in computer vision tasks with abundant labeled data, its performance diminishes significantly in scenarios with limited labeled samples. To address this, Few-shot learning (FSL) enables mode...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical t...
详细信息
This paper presents a high-security medical image encryption method that leverages a novel and robust sine-cosine *** map demonstrates remarkable chaotic dynamics over a wide range of *** employ nonlinear analytical tools to thoroughly investigate the dynamics of the chaotic map,which allows us to select optimal parameter configurations for the encryption *** findings indicate that the proposed sine-cosine map is capable of generating a rich variety of chaotic attractors,an essential characteristic for effective *** encryption technique is based on bit-plane decomposition,wherein a plain image is divided into distinct bit *** planes are organized into two matrices:one containing the most significant bit planes and the other housing the least significant *** subsequent phases of chaotic confusion and diffusion utilize these matrices to enhance *** auxiliary matrix is then generated,comprising the combined bit planes that yield the final encrypted *** results demonstrate that our proposed technique achieves a commendable level of security for safeguarding sensitive patient information in medical *** a result,image quality is evaluated using the Structural Similarity Index(SSIM),yielding values close to zero for encrypted images and approaching one for decrypted ***,the entropy values of the encrypted images are near 8,with a Number of Pixel Change Rate(NPCR)and Unified Average Change Intensity(UACI)exceeding 99.50%and 33%,***,quantitative assessments of occlusion attacks,along with comparisons to leading algorithms,validate the integrity and efficacy of our medical image encryption approach.
Vortices are whirling disturbances,commonly found in nature,ranging from tremendously small scales in Bose-Einstein condensations to cosmologically colossal scales in spiral *** optical vortex,generally associated wit...
详细信息
Vortices are whirling disturbances,commonly found in nature,ranging from tremendously small scales in Bose-Einstein condensations to cosmologically colossal scales in spiral *** optical vortex,generally associated with a spiral phase,can carry orbital angular momentum(OAM).The optical OAM can either be in the longitudinal direction if the spiral phase twists in the spatial domain or in the transverse direction if the phase rotates in the spatiotemporal *** this article,we demonstrate the intersection of spatiotemporal vortices and spatial vortices in a wave *** a result of this intersection,the wave packet hosts a tilted OAM that provides an additional degree of freedom to the applications that harness the OAM of photons.
For the trajectory tracking problem of a single-joint manipulator system with sensor faults. A fuzzy control system incorporating command filtering and event-triggered technology is devised to enhance system tracking ...
详细信息
Optoelectronic devices are advantageous in in-memory light sensing for visual information processing,recognition,and storage in an energy-efficient ***,in-memory light sensors have been proposed to improve the energy,...
详细信息
Optoelectronic devices are advantageous in in-memory light sensing for visual information processing,recognition,and storage in an energy-efficient ***,in-memory light sensors have been proposed to improve the energy,area,and time efficiencies of neuromorphic computing *** study is primarily focused on the development of a single sensing-storage-processing node based on a two-terminal solution-processable MoS2 metal-oxide-semiconductor(MOS)charge-trapping memory structure—the basic structure for charge-coupled devices(CCD)—and showing its suitability for in-memory light sensing and artificial visual *** memory window of the device increased from 2.8 V to more than 6V when the device was irradiated with optical lights of different wavelengths during the program ***,the charge retention capability of the device at a high temperature(100 ℃)was enhanced from 36 to 64%when exposed to a light wavelength of 400 *** larger shift in the threshold voltage with an increasing operating voltage confirmed that more charges were trapped at the Al_(2)O_(3)/MoS_(2) interface and in the MoS_(2) layer.A small convolutional neural network was proposed to measure the optical sensing and electrical programming abilities of the *** array simulation received optical images transmitted using a blue light wavelength and performed inference computation to process and recognize the images with 91%*** study is a significant step toward the development of optoelectronic MOS memory devices for neuromorphic visual perception,adaptive parallel processing networks for in-memory light sensing,and smart CCD cameras with artificial visual perception capabilities.
3D object detection plays a crucial role in many fields such as autonomous driving, robot perception and other fields. Current methods encounter limitations when dealing with intricate point cloud data, such as poor p...
详细信息
Outlier is a value that lies outside most of the other values in a dataset. Outlier exploration has a huge importance in almost all the industry applications like medical diagnosis, credit card fraudulence and intrusi...
详细信息
Transformers have emerged as a groundbreaking architecture in the field of computer vision, offering a compelling alternative to traditional convolutional neural networks (CNNs) by enabling the modeling of long-range ...
详细信息
There has been a meteoric rise in the use of wireless sensor networks (WSNs) in recent years. WSN's compact size and low cost are enticing many different industries to adopt them for use in a wide range of applica...
详细信息
暂无评论