Digital image forensics currently mainly uses PRNU noise as a fingerprint to attribute an image to a particular camera. However PRNU is usually extracted manually using Maximum Likelihood estimation from multiple imag...
详细信息
Blockchain is a technology that creates trust among non-trusting parties without relying on any ***,it has attracted the interest of companies operating in a multitude of ***,due to the number of different blockchain ...
详细信息
Blockchain is a technology that creates trust among non-trusting parties without relying on any ***,it has attracted the interest of companies operating in a multitude of ***,due to the number of different blockchain solutions that have emerged in the last few years and their rapid changes,it is challenging for such companies to orient their technological *** paper presents a comparative analysis of the key dimensions—namely,governance,maturity,support,latency,privacy,interoperability,flexibility,efficiency,resiliency,and scalability—of some of the most-used permissioned blockchain ***,we present the results of a performance evaluation considering the following frameworks:Hyperledger Fabric 2.2,Hyperledger Sawtooth 1.2,and ConsenSys Quorum 21.1(with both the GoQuorum client and the Hyperledger Besu client).The platforms were tested under similar conditions,and official releases were used,such that our findings provide a reference for companies establishing their technological orientation.
Algorithmic recourses are popular methods to provide individuals impacted by machine learning models with recommendations on feasible actions for a more favorable prediction. Most of the previous algorithmic recourse ...
详细信息
Electromagnetic compatibility problems may be extremely computationally expensive and the introduction of evolutionary optimization may need tens of thousands of fitness evaluations. The recent introduction of quantum...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to...
详细信息
In the increasingly digitized world, the privacy and security of sensitive data shared via IoT devices are paramount. Traditional privacy-preserving methods like k-anonymity and ldiversity are becoming outdated due to technological advancements. In addition, data owners often worry about misuse and unauthorized access to their personal information. To address this, we propose a secure data-sharing framework that uses local differential privacy (LDP) within a permissioned blockchain, enhanced by federated learning (FL) in a zero-trust environment. To further protect sensitive data shared by IoT devices, we use the Interplanetary File System (IPFS) and cryptographic hash functions to create unique digital fingerprints for files. We mainly evaluate our system based on latency, throughput, privacy accuracy, and transaction efficiency, comparing the performance to a benchmark model. The experimental results show that the proposed system outperforms its counterpart in terms of latency, throughput, and transaction efficiency. The proposed model achieved a lower average latency of 4.0 seconds compared to the benchmark model’s 5.3 seconds. In terms of throughput, the proposed model achieved a higher throughput of 10.53 TPS (transactions per second) compared to the benchmark model’s 8 TPS. Furthermore, the proposed system achieves 85% accuracy, whereas the counterpart achieves only 49%. IEEE
This research focuses on a novel algorithm for Reinforcement Learning (RL) in Regular Decision Processes (RDPs), a model of non-Markovian decision processes where dynamics and rewards depend on regular properties of t...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a da...
详细信息
In data mining and machine learning,feature selection is a critical part of the process of selecting the optimal subset of features based on the target *** are 2n potential feature subsets for every n features in a dataset,making it difficult to pick the best set of features using standard ***,in this research,a new metaheuristics-based feature selection technique based on an adaptive squirrel search optimization algorithm(ASSOA)has been *** using metaheuristics to pick features,it is common for the selection of features to vary across runs,which can lead to *** of this,we used the adaptive squirrel search to balance exploration and exploitation duties more evenly in the optimization *** the selection of the best subset of features,we recommend using the binary ASSOA search strategy we developed *** to the suggested approach,the number of features picked is reduced while maximizing classification accuracy.A ten-feature dataset from the University of California,Irvine(UCI)repository was used to test the proposed method’s performance *** other state-of-the-art approaches,including binary grey wolf optimization(bGWO),binary hybrid grey wolf and particle swarm optimization(bGWO-PSO),bPSO,binary stochastic fractal search(bSFS),binary whale optimization algorithm(bWOA),binary modified grey wolf optimization(bMGWO),binary multiverse optimization(bMVO),binary bowerbird optimization(bSBO),binary hybrid GWO and genetic algorithm 4028 CMC,2023,vol.74,no.2(bGWO-GA),binary firefly algorithm(bFA),and *** results confirm the superiority and effectiveness of the proposed algorithm for solving the problem of feature selection.
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data t...
详细信息
Managing physical objects in the network’s periphery is made possible by the Internet of Things(IoT),revolutionizing human *** attacks and unauthorized access are possible with these IoT devices,which exchange data to enable remote *** attacks are often detected using intrusion detection methodologies,although these systems’effectiveness and accuracy are *** paper proposes a new voting classifier composed of an ensemble of machine learning models trained and optimized using metaheuristic *** employed metaheuristic optimizer is a new version of the whale optimization algorithm(WOA),which is guided by the dipper throated optimizer(DTO)to improve the exploration process of the traditionalWOA *** proposed voting classifier categorizes the network intrusions robustly and *** assess the proposed approach,a dataset created from IoT devices is employed to record the efficiency of the proposed algorithm for binary attack *** dataset records are balanced using the locality-sensitive hashing(LSH)and Synthetic Minority Oversampling Technique(SMOTE).The evaluation of the achieved results is performed in terms of statistical analysis and visual plots to prove the proposed approach’s effectiveness,stability,and *** achieved results confirmed the superiority of the proposed algorithm for the task of network intrusion detection.
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable ...
详细信息
In recent years, the data-driven electricity theft detection methods integrated with edge cloud computing [1, 2] have not only demonstrated superior detection accuracy but also improved efficiency, making them viable alternatives to indoor inspections. Energy service providers(ESPs) typically manage regions by dividing them into various transformer districts(TDs). The detection of electricity theft in a particular region is performed by the associated TD,
Automated diagnosis has always been a challenging task to AI. When model-based diagnosis is adopted, a model of the system is required in order to generate a set of diagnoses based on a collection of observations, whe...
详细信息
Automated diagnosis has always been a challenging task to AI. When model-based diagnosis is adopted, a model of the system is required in order to generate a set of diagnoses based on a collection of observations, where a diagnosis is a set of faulty components or, more generally, a set of faults ascribed to components. An active system (AS) is an asynchronous, distributed discrete-event system, whose model consists of a topology (how components are connected to one another), and a communicating automaton for each component (the mode in which a component reacts to events). A problem afflicting all model-based approaches to diagnosis is a possibly large number of diagnoses explaining the observations, which may jeopardize the task of a diagnostician in charge of monitoring the system, owing to the cognitive overload raised by an overwhelming number of faulty scenarios to examine. This is exacerbated in critical application domains, where, under uncertain conditions, an artificial agent is supposed to perform recovery actions in real-time, even in the order of milliseconds, to possibly restore the system. To make diagnosis of ASs viable in critical, real-time application domains, a Smart Diagnosis Engine is presented, which is grounded on two heuristics: (1) if a diagnosis δ is a superset of a diagnosis δ′, then δ is ignored (minimality);(2) if the cardinality (number of faults) of a diagnosis δ is lower than the cardinality of a diagnosis δ′, then δ is generated before δ′ (sorting). Consequently, the diagnosis output consists in a sequence of minimal diagnoses that are generated in ascending order by cardinality. As indicated by the experimental results, the overall improvement is twofold: most likely diagnoses are generated upfront, thereby supporting real-time recovery actions;also, the abductive search in the behavior space of the AS is reduced considerably, owing to the pruning of the trajectories that will not generate minimal diagnoses, thereby resulting in an
暂无评论