The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectab...
详细信息
The authors consider the property of detectability of discrete event systems in the presence of sensor attacks in the context of *** authors model the system using an automaton and study the general notion of detectability where a given set of state pairs needs to be(eventually or periodically)distinguished in any estimate of the state of the *** authors adopt the ALTER sensor attack model from previous work and formulate four notions of CA-detectability in the context of this attack model based on the following attributes:strong or weak;eventual or *** authors present verification methods for strong CA-detectability and weak *** authors present definitions of strong and weak periodic CA-detectability that are based on the construction of a verifier automaton called the augmented *** development also resulted in relaxing assumptions in prior results on D-detectability,which is a special case of CA-detectability.
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE service...
详细信息
The Internet of Everything(IoE)based cloud computing is one of the most prominent areas in the digital big data *** approach allows efficient infrastructure to store and access big real-time data and smart IoE services from the *** IoE-based cloud computing services are located at remote locations without the control of the data *** data owners mostly depend on the untrusted Cloud Service Provider(CSP)and do not know the implemented security *** lack of knowledge about security capabilities and control over data raises several security *** Acid(DNA)computing is a biological concept that can improve the security of IoE big *** IoE big data security scheme consists of the Station-to-Station Key Agreement Protocol(StS KAP)and Feistel cipher *** paper proposed a DNA-based cryptographic scheme and access control model(DNACDS)to solve IoE big data security and access *** experimental results illustrated that DNACDS performs better than other DNA-based security *** theoretical security analysis of the DNACDS shows better resistance capabilities.
Rank aggregation is the combination of several ranked lists from a set of candidates to achieve a better ranking by combining information from different sources. In feature selection problem, due to the heterogeneity ...
详细信息
Human activity recognition is a crucial domain in computerscience and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ...
详细信息
The performance of convolutional neural networks (CNN) for computer vision problems depends heavily on their architectures. Transfer learning performance of a CNN strongly relies on selection of its trainable layers. ...
详细信息
Satellite image classification is vital for land cover mapping, environmental monitoring, and urban planning. This paper proposes a method for classifying satellite images using Deep Neural Networks (DNNs) combined wi...
详细信息
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing...
详细信息
Image tampering detection and localization have emerged as a critical domain in combating the pervasive issue of image manipulation due to the advancement of the large-scale availability of sophisticated image editing *** manual forgery localization is often reliant on forensic *** recent times,machine learning(ML)and deep learning(DL)have shown promising results in automating image forgery ***,the ML-based method relies on hand-crafted ***,the DL method automatically extracts shallow spatial features to enhance the ***,DL-based methods lack the global co-relation of the features due to this performance degradation noticed in several *** the proposed study,we designed FLTNet(forgery localization transformer network)with a CNN(convolution neural network)encoder and transformer-based *** encoder extracts local high-dimensional features,and the transformer provides the global co-relation of the *** the decoder,we have exclusively utilized a CNN to upsample the features that generate tampered mask ***,we evaluated visual and quantitative performance on three standard datasets and comparison with six state-of-the-art *** IoU values of the proposed method on CASIA V1,CASIA V2,and CoMoFoD datasets are 0.77,0.82,and 0.84,*** addition,the F1-scores of these three datasets are 0.80,0.84,and 0.86,***,the visual results of the proposed method are clean and contain rich information,which can be used for real-time forgery *** code used in the study can be accessed through URL:https://***/ajit2k5/Forgery-Localization(accessed on 21 January 2025).
In an Internet of Things (IoT) assisted Wireless Sensor Network (WSN), the location of the Base Station (BS) remains important. BS serves as the central hub for data collection, aggregation and communication within th...
详细信息
Background: Human physical activity recognition is challenging in various research eras, such as healthcare, surveillance, senior monitoring, athletics, and rehabilitation. The use of various sensors has attracted out...
详细信息
Disastrous situations pose a formidable challenge, testing our resilience against nature's fury and the race against time to prevent the loss of human life. It is noted that in such situations that Microblogging p...
详细信息
暂无评论