The advancement in technology leads to provide an efficient communication among vehicles to offload resource-intensive tasks for transportation-based services. However, it may cause issue related to efficient secure r...
详细信息
Recently, deep learning neural networks have been widely used in object classification. The process of object classification typically involves extracting features from the point cloud using neural networks and integr...
详细信息
The percentage of people affected by skin cancer has been rising in recent years. Melanoma is identified as the most dangerous and life-threatening among the three types of skin cancer since it causes more deaths than...
详细信息
The current large-scale Internet of Things(IoT)networks typically generate high-velocity network traffic *** use IoT devices to create botnets and launch attacks,such as DDoS,Spamming,Cryptocurrency mining,Phishing,**...
详细信息
The current large-scale Internet of Things(IoT)networks typically generate high-velocity network traffic *** use IoT devices to create botnets and launch attacks,such as DDoS,Spamming,Cryptocurrency mining,Phishing,*** service providers of large-scale IoT networks need to set up a data pipeline to collect the vast network traffic data from the IoT devices,store it,analyze it,and report the malicious IoT devices and types of ***,the attacks originating from IoT devices are dynamic,as attackers launch one kind of attack at one time and another kind of attack at another *** number of attacks and benign instances also vary from time to *** phenomenon of change in attack patterns is called concept ***,the attack detection system must learn continuously from the ever-changing real-time attack patterns in large-scale IoT network *** meet this requirement,in this work,we propose a data pipeline with Apache Kafka,Apache Spark structured streaming,and MongoDB that can adapt to the ever-changing attack patterns in real time and classify attacks in large-scale IoT *** concept drift is detected,the proposed system retrains the classifier with the instances that cause the drift and a representative subsample instances from the previous training of the *** proposed approach is evaluated with the latest dataset,IoT23,which consists of benign and several attack instances from various IoT *** classification accuracy is improved from 97.8%to 99.46%by the proposed *** training time of distributed random forest algorithm is also studied by varying the number of cores in Apache Spark environment.
Chronic kidney disease (CKD) is a prominent disease that causes loss of functionality in the kidney. Doctors can now more easily gather patient health status data due to the growth of the Internet of Health Things (Io...
详细信息
Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on *** of the major challenges in tackling this problem is the complexit...
详细信息
Windows malware is becoming an increasingly pressing problem as the amount of malware continues to grow and more sensitive information is stored on *** of the major challenges in tackling this problem is the complexity of malware analysis,which requires expertise from human *** developments in machine learning have led to the creation of deep models for malware ***,these models often lack transparency,making it difficult to understand the reasoning behind the model’s decisions,otherwise known as the black-box *** address these limitations,this paper presents a novel model for malware detection,utilizing vision transformers to analyze the Operation Code(OpCode)sequences of more than 350000 Windows portable executable malware samples from real-world *** model achieves a high accuracy of 0.9864,not only surpassing the previous results but also providing valuable insights into the reasoning behind the *** model is able to pinpoint specific instructions that lead to malicious behavior in malware samples,aiding human experts in their analysis and driving further advancements in the *** report our findings and show how causality can be established between malicious code and actual classification by a deep learning model,thus opening up this black-box problem for deeper analysis.
Artificial intelligence together with its applications are advancing in all fields, particularly medical science. A considerable quantity of clinical data is available, yet the vast majority of it is wasted. It will b...
详细信息
We developed an information system using an object-oriented programming language and a distributed database (DDB) consisting of multiple interconnected databases across a computer network, managed by a distributed dat...
详细信息
The rapid evolution of wireless technologies and the growing complexity of network infrastructures necessitate a paradigm shift in how communication networks are designed,configured,and managed. Recent advancements in...
详细信息
The rapid evolution of wireless technologies and the growing complexity of network infrastructures necessitate a paradigm shift in how communication networks are designed,configured,and managed. Recent advancements in large language models (LLMs) have sparked interest in their potential to revolutionize wireless communication systems. However, existing studies on LLMs for wireless systems are limited to a direct application for telecom language understanding. To empower LLMs with knowledge and expertise in the wireless domain, this paper proposes WirelessLLM, a comprehensive framework for adapting and enhancing LLMs to address the unique challenges and requirements of wireless communication networks. We first identify three foundational principles that underpin WirelessLLM:knowledge alignment, knowledge fusion, and knowledge evolution. Then,we investigate the enabling technologies to build WirelessLLM, including prompt engineering, retrieval augmented generation, tool usage, multi-modal pre-training, and domain-specific fine-tuning. Moreover, we present three case studies to demonstrate the practical applicability and benefits of WirelessLLM for solving typical problems in wireless networks. Finally, we conclude this paper by highlighting key challenges and outlining potential avenues for future research.
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device **...
详细信息
The concept of smart houses has grown in prominence in recent *** challenges linked to smart homes are identification theft,data safety,automated decision-making for IoT-based devices,and the security of the device *** home automation systems try to address these issues but there is still an urgent need for a dependable and secure smart home solution that includes automatic decision-making systems and methodical *** paper proposes a smart home system based on ensemble learning of random forest(RF)and convolutional neural networks(CNN)for programmed decision-making tasks,such as categorizing gadgets as“OFF”or“ON”based on their normal routine in *** have integrated emerging blockchain technology to provide secure,decentralized,and trustworthy authentication and recognition of IoT *** system consists of a 5V relay circuit,various sensors,and a Raspberry Pi server and database for managing *** have also developed an Android app that communicates with the server interface through an HTTP web interface and an Apache *** feasibility and efficacy of the proposed smart home automation system have been evaluated in both laboratory and real-time *** is essential to use inexpensive,scalable,and readily available components and technologies in smart home automation ***,we must incorporate a comprehensive security and privacy-centric design that emphasizes risk assessments,such as cyberattacks,hardware security,and other cyber *** trial results support the proposed system and demonstrate its potential for use in everyday life.
暂无评论