The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic ***,concerns have been raised over th...
详细信息
The application of artificial intelligence technology in Internet of Vehicles(lov)has attracted great research interests with the goal of enabling smart transportation and traffic ***,concerns have been raised over the security and privacy of the tons of traffic and vehicle *** this regard,Federated Learning(FL)with privacy protection features is considered a highly promising ***,in the FL process,the server side may take advantage of its dominant role in model aggregation to steal sensitive information of users,while the client side may also upload malicious data to compromise the training of the global *** existing privacy-preserving FL schemes in IoV fail to deal with threats from both of these two sides at the same *** this paper,we propose a Blockchain based Privacy-preserving Federated Learning scheme named BPFL,which uses blockchain as the underlying distributed framework of *** improve the Multi-Krum technology and combine it with the homomorphic encryption to achieve ciphertext-level model aggregation and model filtering,which can enable the verifiability of the local models while achieving ***,we develop a reputation-based incentive mechanism to encourage users in IoV to actively participate in the federated learning and to practice *** security analysis and performance evaluations are conducted to show that the proposed scheme can meet the security requirements and improve the performance of the FL model.
The document classification (DC) task assigns predefined classes to unlabeled documents using trained models. In the medical field, DC is crucial for tasks like categorizing risk factors and classifying electronic hea...
详细信息
Through computer vision and image processing techniques, a set of images from a scene can be reconstructed in 3D to recover a 3D model of the scene, in which dense reconstruction is a crucial part, and most existing a...
详细信息
This paper presents a system for detecting orange juice concentration based on the principle of solution absorption of visible light. The system efficiently detects orange juice concentration using visible light commu...
详细信息
Blockchain technology gained much traction in the last few years. These decentralized databases offer security, immutability, and scalability across various applications. Decentralized applications generate vast amoun...
详细信息
Erasable itemset mining is one of the most well-known methods in data mining for optimizing limited materials. After mining erasable itemsets, the manager can rearrange the production plan effectively. However, in rea...
详细信息
The neural network methods in solving differential equations have significant research importance and promising application prospects. Aimed at the time-fractional Huxley (TFH) equation, we propose a novel fractional ...
详细信息
Flame detection algorithms are crucial for real-time fire monitoring using surveillance cameras. Current flame detection algorithms perform excellently on color cameras;however, many night vision cameras can only capt...
详细信息
Automatic Term Recognition is used to extract domain-specific terms that belong to a given domain. In order to be accurate, these corpus and language-dependent methods require large volumes of textual data that need t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
暂无评论