With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the secu...
详细信息
With the large scale adoption of Internet of Things(IoT)applications in people’s lives and industrial manufacturing processes,IoT security has become an important problem *** security significantly relies on the security of the underlying hardware chip,which often contains critical information,such as encryption *** understand existing IoT chip security,this study analyzes the security of an IoT security chip that has obtained an Arm Platform Security Architecture(PSA)Level 2 *** analysis shows that the chip leaks part of the encryption key and presents a considerable security ***,we use commodity equipment to collect electromagnetic traces of the *** a statistical T-test,we find that the target chip has physical leakage during the AES encryption *** further use correlation analysis to locate the detailed encryption interval in the collected electromagnetic trace for the Advanced Encryption Standard(AES)encryption *** the basis of the intermediate value correlation analysis,we recover half of the 16-byte AES encryption *** repeat the process for three different tests;in all the tests,we obtain the same result,and we recover around 8 bytes of the 16-byte AES encryption ***,experimental results indicate that despite the Arm PSA Level 2 certification,the target security chip still suffers from physical *** layer application developers should impose strong security mechanisms in addition to those of the chip itself to ensure IoT application security.
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
This study investigates an approach that combines text and image data to classify web pages based on their content. In this methodology, Convolutional Neural Networks (CNN) are used to analyze text data, while the YOL...
详细信息
Protein-protein interactions (PPI) are essential in keeping the cells functioning properly. Identifying PPI binding sites is a fundamental problem in system Biology, and it contributes to a better understanding of low...
详细信息
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS...
详细信息
ISBN:
(纸本)9798331508692
The integration of IoT devices in smart cities enhances urban infrastructure, services, and governance but also introduces significant cybersecurity challenges. Traditional centralized Intrusion Detection Systems (IDS) face several issues, including data privacy concerns and high-power consumption due to centralized data processing. These challenges increase the risks of unauthorized access, data breaches, and privacy violations, undermining user trust and compliance with privacy regulations. Additionally, the centralization of data and processing leads to higher power consumption, making these systems less sustainable for widespread deployment in smart cities. This research addresses these issues by proposing a Federated Learning (FL)based intrusion detection framework for smart cities. FL enables collaborative and privacy-preserving model training across distributed IoT devices, mitigating the need to share sensitive data centrally. By aggregating local model updates, FL ensures data privacy and distributes the computational workload, significantly reducing power consumption compared to traditional centralized systems. The proposed model leverages advanced AI techniques and is trained using the IoTID20 dataset. The Flower framework, utilizing the FedAvg algorithm, facilitates the federated learning process. Our experimental results demonstrate that the global model achieves 98% accuracy, with individual clients achieving accuracies of around 85% to 98%. This approach provides continuous learning mechanisms, anomaly detection, and ensemble learning capabilities, enhancing the resilience of federated intrusion detection systems against emerging threats and adversarial attacks. This research systematically investigates the application of federated learning for intrusion detection in smart city networks, addressing key challenges and advancing the state-of-the-art in decentralized cybersecurity solutions. The proposed framework offers a robust, scalable, and privacyco
Large Language Models(LLMs) have become widely recognized in recent years for their exceptional performance in language generation capabilities. As a result, an unprecedented rise is seen in its use cases in various d...
详细信息
ISBN:
(纸本)9798331508692
Large Language Models(LLMs) have become widely recognized in recent years for their exceptional performance in language generation capabilities. As a result, an unprecedented rise is seen in its use cases in various domains specifically involving Natural Language Processing(NLP). These models however perform suboptimally when exploited in the field of studies where authenticity of the generated content is a critical aspect. One such domain is usage of LLM for exploration of the life of Prophet Muhammad S.A.W(commonly referred to as Seerah). It is of utmost significance to ensure the authenticity and reliability in the sources used and reported by the LLM due to the sensitive nature of the domain. The contemporary LLMs, however, lack the explainability in their response due to their inherent black-box nature. In our study, we have presented a novel LLM named SeerahGPT that addresses this challenge with the help of retrieval-augmented generation (RAG). This technique enables the model to utilize both parametric and nonparametric memories for generating response of queries. Our model, built on the Llama-2-7b architecture, employs Sentence Transformer embedding to effectively retrieve relevant information. The model's capabilities are augmented by integrating it with a corpus having Islamic texts such as the Quranic translation and Hadith collections, and historical accounts. The model's performance is benchmarked against its base model using both quantitative and qualitative metrics. The comparative analysis with Llama-2-7b revealed that SeerahGPT incorporation with external knowledge sources, provided more authentic and verifiable responses, despite the others exhibiting greater fluency. Performance metrics such as BLEU, ROUGE, and METEOR indicated SeerahGPT's better accuracy and contextual handling. This study paves way for analysis of such sensitive domains in more efficient way that can be utilized in other complex domains such as Islamic theology and Fiqh or legal
Sri Lankan students, especially those from rural and low-income backgrounds, face significant challenges in accessing higher education, including university applications, career planning, and financial aid. This resea...
详细信息
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definition...
详细信息
Metaverse describes a new shape of cyberspace and has become a hot-trending word since *** are many explanations about what Meterverse is and attempts to provide a formal standard or definition of ***,these definitions could hardly reach universal *** than providing a formal definition of the Metaverse,we list four must-have characteristics of the Metaverse:socialization,immersive interaction,real world-building,and *** characteristics not only carve the Metaverse into a novel and fantastic digital world,but also make it suffer from all security/privacy risks,such as personal information leakage,eavesdropping,unauthorized access,phishing,data injection,broken authentication,insecure design,and *** paper first introduces the four characteristics,then the current progress and typical applications of the Metaverse are surveyed and categorized into four economic *** on the four characteristics and the findings of the current progress,the security and privacy issues in the Metaverse are *** then identify and discuss more potential critical security and privacy issues that can be caused by combining the four ***,the paper also raises some other concerns regarding society and humanity.
Several newly developed techniques and tools for manipulating images, audio, and videos have been introduced as an outcome of the recent and rapid breakthroughs in AI, machine learning, and deep learning. While most a...
详细信息
The use of assistive technology in the field of education is now a common practice in today's tech-driven era. The implementation is quite rampant in all levels and sections of education, including by special need...
详细信息
暂无评论