A significant proportion of web elements might manifest identical behaviors and functionalities, further complicating the test case creation process. We have noted that elements demonstrating congruent behavior and fu...
A significant proportion of web elements might manifest identical behaviors and functionalities, further complicating the test case creation process. We have noted that elements demonstrating congruent behavior and functionality frequently exhibit visual resemblances within the web page interface. In this paper, we propose a machine learning-based method to identify visually similar web elements. These identified elements can be brought to the attention of the tester. If the tester determines that these elements exhibit similar behavior, they can be visually marked on the web page, facilitating focused test case creation. A case study demonstrates its potential to make accurate judgments on several complex webpages.
The modern age is witnessing a significant development in information technology. The Internet of Things (henceforth IoT) technology is one such advancement. Since its emergence, it has affected people's life posi...
The modern age is witnessing a significant development in information technology. The Internet of Things (henceforth IoT) technology is one such advancement. Since its emergence, it has affected people's life positively. For instance, it has provided many services to people, made their life easier and reduced effort with more accurate information in concurrent time. Although IoT technology has considerably advanced since its inception, it still faces many challenges. The biggest of which is how to protect the privacy and confidentiality of data. Consequently, information security challenges have increased to keep up with IoT technology's large amount of information. In this paper, the researchers collected, analysed and summarised reliable, relevant sources to obtain information that addressed various security threats. This paper, therefore, sheds light on the most prominent challenges facing information security in the revolution of IoT in developing countries.
The quantum-resistant qualities of various encryption methods, such as N-th degree Truncated polynomial Ring Units (NTRU) Encrypt, NTRU Sign, Ring-Lizard, and Kyber protocols are becoming more important in light of th...
The quantum-resistant qualities of various encryption methods, such as N-th degree Truncated polynomial Ring Units (NTRU) Encrypt, NTRU Sign, Ring-Lizard, and Kyber protocols are becoming more important in light of the ever-evolving nature of digital threats. An-depth analysis of the mathematical derivation of these algorithms, as well as a determination of their computing efficiency and resistance to quantum assaults is discussed in this paper. Techniques of the Ring-Lizard and Kyber algorithms to lattice-based encryption are analyzed. The study gives an overview of quantum-resistant capabilities of these algorithms and their performance measures. Strengths and weaknesses of the NTRU Encrypt, NTRU Sign, Ring-Lizard, and Kyber algorithms are discussed. The results give useful insights for cybersecurity practitioners, academics, and policymakers, aiding them in making educated choices to protect digital infrastructures against quantum attacks.
Zero-reference low-light image enhancement (LLIE) techniques mainly focus on grey-scale inhomogeneities, and few approaches consider how to explicitly recover a given dark scene for achieving color and holistic illumi...
详细信息
Recent studies have revealed that deep learning-based speaker recognition systems (SRSs) are vulnerable to adversarial examples (AEs). However, the practicality of existing black-box AE attacks is restricted by the re...
ISBN:
(纸本)9781939133441
Recent studies have revealed that deep learning-based speaker recognition systems (SRSs) are vulnerable to adversarial examples (AEs). However, the practicality of existing black-box AE attacks is restricted by the requirement for extensive querying of the target system or the limited attack success rates (ASR). In this paper, we introduce VoxCloak, a new targeted AE attack with superior performance in both these aspects. Distinct from existing methods that optimize AEs by querying the target model, VoxCloak initially employs a small number of queries (e.g., a few hundred) to infer the feature extractor used by the target system. It then utilizes this feature extractor to generate any number of AEs locally without the need for further queries. We evaluate Vox-Cloak on four commercial speaker recognition (SR) APIs and seven voice assistants. On the SR APIs, VoxCloak surpasses the existing transfer-based attacks, improving ASR by 76.25% and signal-to-noise ratio (SNR) by 13.46 dB, as well as the decision-based attacks, requiring 33 times fewer queries and improving SNR by 7.87 dB while achieving comparable ASRs. On the voice assistants, VoxCloak outperforms the existing methods with a 49.40% improvement in ASR and a 15.79 dB improvement in SNR.
Smart meters (SMs) are deployed in smart power grids to monitor customer power consumption and facilitate energy management. However, fraudulent customers can compromise these SMs to manipulate power readings and enga...
详细信息
ISBN:
(数字)9798350385328
ISBN:
(纸本)9798350385335
Smart meters (SMs) are deployed in smart power grids to monitor customer power consumption and facilitate energy management. However, fraudulent customers can compromise these SMs to manipulate power readings and engage in electricity theft cyber-attacks, resulting in reduced electricity bills. While various machine learning approaches have been employed for detecting such attacks, the potential of reinforcement learning (RL) remains unexplored. To bridge this gap, we propose a deep reinforcement learning (DRL) approach that leverages RL's adapt-ability to dynamic cyber-attacks and consumption patterns. This approach integrates exploration and exploitation mechanisms, enabling optimal decision-making. In this study, we present our approach in two scenarios. Firstly, we develop comprehensive detection models using deep Q networks (DQN) and double deep Q networks (DDQN) with various deep neural network architectures. Secondly, we address the challenges of defending against newly launched cyber-attacks. Extensive experimentation provides strong evidence of the effectiveness of our DRL approach in improving the detection of electricity theft cyber-attacks, as well as its capacity to efficiently adapt and defend against newly launched cyber-attacks.
This paper proposes a novel automatic frequency control (AFC) for modified Walsh-Hadamard code division multiplexing (MWHCDM). While MWHCDM is suitable for helicopter satellite communications, where rotor blades perio...
This paper proposes a novel automatic frequency control (AFC) for modified Walsh-Hadamard code division multiplexing (MWHCDM). While MWHCDM is suitable for helicopter satellite communications, where rotor blades periodically block the transmission channel, it is affected by a time-varying Doppler shift due to helicopter maneuvers. The conventional AFC has a problem where its pull-in range is significantly narrower than the fluctuation range of the Doppler shift. The proposed AFC utilizes the structure of MWHCDM signals, and its operating range covers the fluctuation range with enough margin. computer simulation shows that the proposed AFC outperforms the conventional one on both operating/pull-in range and frequency estimation accuracy.
In the current study, tin (Sn) whisker growth was observed on the surface of the SAC0307-SiC composite solder joint. A commercial SAC0307 solder alloys were reinforced with SiC nanophases to produce composite solder j...
详细信息
Unmanned aerial vehicles (UAV), due to their flexibility and extensive coverage, have gradually become essential for substation inspections. Wireless mesh networks (WMN) provide a scalable and resilient network enviro...
详细信息
Considering the distinct scattering characteristics observed in diverse frequency bands for terrain surfaces, the utilization of complementary information from multi-band PolSAR data proves advantageous in effectively...
Considering the distinct scattering characteristics observed in diverse frequency bands for terrain surfaces, the utilization of complementary information from multi-band PolSAR data proves advantageous in effectively distinguishing targets that may present challenges when assessed in isolation within a single band. In this study, we employ the polarimetric target decomposition methods to investigate the scattering characteristics of representative targets within the C and L bands. Based on these findings, we construct a random forest fine classification model specifically tailored for different types of urban vegetation. Notably, experimental results demonstrate a noteworthy enhancement in classification accuracy following the integration of multi-band data.
暂无评论