Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy ...
Knowledge graphs(KGs) effectively mitigate data sparsity in recommendation systems(RSs) by providing valuable auxiliary information [1]. However, traditional centralized KG-based RSs increase the risk of user privacy *** learning(FL) enhances RS's privacy by enabling model training on decentralized data [2]. Although integrating KG and FL can address both data sparsity and privacy issues in RSs [3], several challenges persist. CH1,Each client's local model relies on a consistent global model from the server, limiting personalized deployment to endusers.
The remarkable miniaturization of Internet of Things (IoT)-based systems and the rise of distributed intelligence are promising research paradigms in the design of smart cities. IoT and distributed intelligence are co...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged...
详细信息
The rapid growth and pervasive presence of the Internet of Things(IoT)have led to an unparalleled increase in IoT devices,thereby intensifying worries over IoT *** learning(DL)-based intrusion detection(ID)has emerged as a vital method for protecting IoT *** rectify the deficiencies of current detection methodologies,we proposed and developed an IoT cyberattacks detection system(IoT-CDS)based on DL models for detecting bot attacks in IoT *** DL models—long short-term memory(LSTM),gated recurrent units(GRUs),and convolutional neural network-LSTM(CNN-LSTM)were suggested to detect and classify IoT *** BoT-IoT dataset was used to examine the proposed IoT-CDS system,and the dataset includes six attacks with normal *** experiments conducted on the BoT-IoT network dataset reveal that the LSTM model attained an impressive accuracy rate of 99.99%.Compared with other internal and external methods using the same dataset,it is observed that the LSTM model achieved higher accuracy *** are more efficient than GRUs and CNN-LSTMs in real-time performance and resource efficiency for cyberattack *** method,without feature selection,demonstrates advantages in training time and detection ***,the proposed approach can be extended to improve the security of various IoT applications,representing a significant contribution to IoT security.
Internet of Things(IoTs)provides better solutions in various fields,namely healthcare,smart transportation,home,*** Denial of Service(DoS)outbreaks in IoT platforms is significant in certifying the accessibility and i...
详细信息
Internet of Things(IoTs)provides better solutions in various fields,namely healthcare,smart transportation,home,*** Denial of Service(DoS)outbreaks in IoT platforms is significant in certifying the accessibility and integrity of IoT *** learning(DL)models outperform in detecting complex,non-linear relationships,allowing them to effectually severe slight deviations fromnormal IoT activities that may designate a DoS *** uninterrupted observation and real-time detection actions of DL participate in accurate and rapid detection,permitting proactive reduction events to be executed,hence securing the IoT network’s safety and ***,this study presents pigeon-inspired optimization with a DL-based attack detection and classification(PIODL-ADC)approach in an IoT *** PIODL-ADC approach implements a hyperparameter-tuned DL method for Distributed Denial-of-Service(DDoS)attack detection in an IoT ***,the PIODL-ADC model utilizes Z-score normalization to scale input data into a *** handling the convolutional and adaptive behaviors of IoT,the PIODL-ADCmodel employs the pigeon-inspired optimization(PIO)method for feature selection to detect the related features,considerably enhancing the recognition’s ***,the Elman Recurrent Neural Network(ERNN)model is utilized to recognize and classify DDoS ***,reptile search algorithm(RSA)based hyperparameter tuning is employed to improve the precision and robustness of the ERNN method.A series of investigational validations is made to ensure the accomplishment of the PIODL-ADC *** experimental outcome exhibited that the PIODL-ADC method shows greater accomplishment when related to existing models,with a maximum accuracy of 99.81%.
Pretrained transformer-based Language Models (LMs) are well-known for their ability to achieve significant improvement on text classification tasks with their powerful word embeddings, but their black-box nature, whic...
详细信息
The Intelligent Internet of Things(IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent approache...
详细信息
The Intelligent Internet of Things(IIoT) involves real-world things that communicate or interact with each other through networking technologies by collecting data from these “things” and using intelligent approaches, such as Artificial Intelligence(AI) and machine learning, to make accurate decisions. Data science is the science of dealing with data and its relationships through intelligent approaches. Most state-of-the-art research focuses independently on either data science or IIoT, rather than exploring their integration. Therefore, to address the gap, this article provides a comprehensive survey on the advances and integration of data science with the Intelligent IoT(IIoT) system by classifying the existing IoT-based data science techniques and presenting a summary of various characteristics. The paper analyzes the data science or big data security and privacy features, including network architecture, data protection, and continuous monitoring of data, which face challenges in various IoT-based systems. Extensive insights into IoT data security, privacy, and challenges are visualized in the context of data science for IoT. In addition, this study reveals the current opportunities to enhance data science and IoT market development. The current gap and challenges faced in the integration of data science and IoT are comprehensively presented, followed by the future outlook and possible solutions.
Novel viewpoint image synthesis is very challenging,especially from sparse views,due to large changes in viewpoint and *** image-based methods fail to generate reasonable results for invisible regions,while geometry-b...
详细信息
Novel viewpoint image synthesis is very challenging,especially from sparse views,due to large changes in viewpoint and *** image-based methods fail to generate reasonable results for invisible regions,while geometry-based methods have difficulties in synthesizing detailed *** this paper,we propose STATE,an end-to-end deep neural network,for sparse view synthesis by learning structure and texture *** is encoded as a hybrid feature field to predict reasonable structures for invisible regions while maintaining original structures for visible regions,and texture is encoded as a deformed feature map to preserve detailed *** propose a hierarchical fusion scheme with intra-branch and inter-branch aggregation,in which spatio-view attention allows multi-view fusion at the feature level to adaptively select important information by regressing pixel-wise or voxel-wise confidence *** decoding the aggregated features,STATE is able to generate realistic images with reasonable structures and detailed *** results demonstrate that our method achieves qualitatively and quantitatively better results than state-of-the-art *** method also enables texture and structure editing applications benefiting from implicit disentanglement of structure and *** code is available at http://***/faculty/likun/projects/STATE.
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems,...
详细信息
In the wake of rapid advancements in artificial intelligence(AI), we stand on the brink of a transformative leap in data systems. The imminent fusion of AI and DB(AI×DB) promises a new generation of data systems, which will relieve the burden on end-users across all industry sectors by featuring AI-enhanced functionalities, such as personalized and automated in-database AI-powered analytics, and selfdriving capabilities for improved system performance. In this paper, we explore the evolution of data systems with a focus on deepening the fusion of AI and DB. We present NeurDB, an AI-powered autonomous data system designed to fully embrace AI design in each major system component and provide in-database AI-powered analytics. We outline the conceptual and architectural overview of NeurDB, discuss its design choices and key components, and report its current development and future plan.
With the expansion of the Internet market,the traditional software development method has been difficult to meet the market demand due to the problems of long development cycle,tedious work,and difficult system ***,to...
详细信息
With the expansion of the Internet market,the traditional software development method has been difficult to meet the market demand due to the problems of long development cycle,tedious work,and difficult system ***,to improve software development efficiency,this study uses residual networks and bidirectional long short-term memory(BLSTM)networks to improve the Pix2code *** experiment results show that after improving the visual module of the Pix2code model using residual networks,the accuracy of the training set improves from 0.92 to 0.96,and the convergence time is shortened from 3 hours to 2 *** using a BLSTM network to improve the language module and decoding layer,the accuracy and convergence speed of the model have also been *** accuracy of the training set grew from 0.88 to 0.92,and the convergence time was shortened by 0.5 ***,models improved by BLSTM networks might exhibit overfitting,and thus this study uses Dropout and Xavier normal distribution to improve the memory *** results validate that the training set accuracy of the optimized BLSTM network remains around 0.92,but the accuracy of the test set has improved to a maximum of 85%.Dropout and Xavier normal distributions can effectively improve the overfitting problem of BLSTM *** they can also decrease the model’s stability,their gain is *** training and testing accuracy of the Pix2code improved by residual network and BLSTM network are 0.95 and 0.82,respectively,while the code generation accuracy of the original Pix2code is only *** above data indicate that the improved Pix2code model has improved the accuracy and stability of code automatic generation.
Due to its broad usage and predominance, TCP (Transmission Control Protocol) serves as the core of all Internet traffic. TCP is widely used because of its reliable connection-oriented architecture and capacity to mana...
详细信息
暂无评论