The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io...
详细信息
Among various traffic data modeling and predicting methods, graph learning-based models attract more attention, because of their powerful representation ability for modeling spatial and temporal dependencies with grap...
详细信息
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these paramete...
详细信息
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these parameters a sensitive step to maintain a good *** the other hand,and as any other classifier,the performance of SVM is also affected by the input set of features used to build the learning model,which makes the selection of relevant features an important task not only to preserve a good classification accuracy but also to reduce the dimensionality of *** this paper,the MRFO+SVM algorithm is introduced by investigating the recent manta ray foraging optimizer to fine-tune the SVM parameters and identify the optimal feature subset *** proposed approach is validated and compared with four SVM-based algorithms over eight benchmarking ***,it is applied to a disease Covid-19 *** experimental results show the high ability of the proposed algorithm to find the appropriate SVM’s parameters,and its acceptable performance to deal with feature selection problem.
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Yet the Internet of Things continues to grow significantly. A cyber-physical system faces a variety of security challenges due to the network connections made by the various kinds of devices and large systems that mak...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that has been deliberately or accidentally polluted with *** presents a challenge in learning robust GNNs under noisy *** address this issue,we propose a novel framework called Soft-GNN,which mitigates the influence of label noise by adapting the data utilized in *** approach employs a dynamic data utilization strategy that estimates adaptive weights based on prediction deviation,local deviation,and global *** better utilizing significant training samples and reducing the impact of label noise through dynamic data selection,GNNs are trained to be more *** evaluate the performance,robustness,generality,and complexity of our model on five real-world datasets,and our experimental results demonstrate the superiority of our approach over existing methods.
Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-level modif...
详细信息
Image enhancement is a widely used technique in digital image processing that aims to improve image aesthetics and visual quality. However, traditional methods of enhancement based on pixel-level or global-level modifications have limited effectiveness. Recently, as learning-based techniques gain popularity, various studies are now focusing on utilizing networks for image enhancement. However, these techniques often fail to optimize image frequency domains. This study addresses this gap by introducing a transformer-based model for improving images in the wavelet domain. The proposed model refines various frequency bands of an image and prioritizes local details and high-level features. Consequently, the proposed technique produces superior enhancement results. The proposed model’s performance was assessed through comprehensive benchmark evaluations, and the results suggest it outperforms the state-of-the-art techniques.
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret in...
详细信息
Information steganography has received more and more attention from scholars nowadays,especially in the area of image steganography,which uses image content to transmit information and makes the existence of secret information *** enhance concealment and security,the Steganography without Embedding(SWE)method has proven effective in avoiding image distortion resulting from cover *** this paper,a novel encrypted communication scheme for image SWE is *** reconstructs the image into a multi-linked list structure consisting of numerous nodes,where each pixel is transformed into a single node with data and pointer *** employing a special addressing algorithm,the optimal linked list corresponding to the secret information can be *** receiver can restore the secretmessage fromthe received image using only the list header position *** scheme is based on the concept of coverless steganography,eliminating the need for any modifications to the cover *** boasts high concealment and security,along with a complete message restoration rate,making it resistant to ***,this paper proposes linked-list construction schemeswithin theproposedframework,which caneffectively resist a variety of attacks,includingnoise attacks and image compression,demonstrating a certain degree of *** validate the proposed framework,practical tests and comparisons are conducted using multiple *** results affirm the framework’s commendable performance in terms of message reduction rate,hidden writing capacity,and robustness against diverse attacks.
Because of the population of photography camera, human being could have photography equipment to take a picture became an easy task. However, to have a good photography is not an easy task. The basic of a good photo i...
详细信息
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large nu...
详细信息
5G technology has endowed mobile communication terminals with features such as ultrawideband access,low latency,and high reliability transmission,which can complete the network access and interconnection of a large number of devices,thus realizing richer application scenarios and constructing 5G-enabled vehicular ***,due to the vulnerability of wireless communication,vehicle privacy and communication security have become the key problems to be solved in vehicular ***,the large-scale communication in the vehicular networks also makes the higher communication efficiency an inevitable *** order to achieve efficient and secure communication while protecting vehicle privacy,this paper proposes a lightweight key agreement and key update scheme for 5G vehicular networks based on ***,the key agreement is accomplished using certificateless public key cryptography,and based on the aggregate signature and the cooperation between the vehicle and the trusted authority,an efficient key updating method is proposed,which reduces the overhead and protects the privacy of the vehicle while ensuring the communication ***,by introducing blockchain and using smart contracts to load the vehicle public key table for key management,this meets the requirements of vehicle traceability and can dynamically track and revoke misbehaving ***,the formal security proof under the eck security model and the informal security analysis is conducted,it turns out that our scheme is more secure than other authentication schemes in the vehicular *** analysis shows that our scheme has lower overhead than existing schemes in terms of communication and computation.
暂无评论