作者:
Yao, YuhangJafar, Syed A.
Department of Electrical Engineering and Computer Science IrvineCA92697 United States
The optimal quantum communication cost of computing a classical sum of distributed sources is studied over a quantum erasure multiple access channel (QEMAC). K classical messages comprised of finite-field symbols are ...
详细信息
As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters...
详细信息
The most common type of malignant brain tumor, gliomas, has a variety of grades that significantly impact a patient’s chance of survival. Accurate segmentation of brain tumor regions from MRI images is crucial for en...
详细信息
Nowadays, the Internet of Things (IoT) plays a significant role in the development of various real-life applications such as smart cities, healthcare, precision agriculture, and industrial automation. Wireless Sensor ...
详细信息
With the recent advancements of deep learning-based methods in image classification,the requirement of a huge amount of training data is inevitable to avoid overfitting ***,supervised deep learning models require labe...
详细信息
With the recent advancements of deep learning-based methods in image classification,the requirement of a huge amount of training data is inevitable to avoid overfitting ***,supervised deep learning models require labelled datasets for *** such a huge amount of labelled data requires considerable human effort and *** this scenario,self-supervised models are becoming popular because of their ability to learn even from unlabelled ***,the efficient transfer of knowledge learned by self-supervised models into a target task,is an unsolved *** paper proposes a method for the efficient transfer of know-ledge learned by a self-supervised model,into a target *** such as the number of layers,the number of units in each layer,learning rate,and dropout are automatically tuned in these fully connected(FC)layers using a Bayesian optimization technique called the tree-structured parzen estimator(TPE)approach *** evaluate the performance of the proposed method,state-of-the-art self-supervised models such as SimClr and SWAV are used to extract the learned *** are carried out on the CIFAR-10,CIFAR-100,and Tiny ImageNet *** proposed method outperforms the baseline approach with margins of 2.97%,2.45%,and 0.91%for the CIFAR-100,Tiny ImageNet,and CIFAR-10 datasets,respectively.
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for attacking targets with specific *** countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted *** is a sophisticated attack that involves multiple stages and specific ***,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security ***,APTs are generally implemented in multiple *** one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack *** detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing *** survey paper will provide knowledge about APT attacks and their essential *** follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the *** used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
Background: The automated classification of videos through artificial neural networks is addressed in this work. To explore the concepts and measure the results, the data set UCF101 is used, consisting of video clips ...
详细信息
The accurate identification of students in need is crucial for governments and colleges to allocate resources more effectively and enhance social equity and educational fairness. Existing approaches to identifying stu...
详细信息
The healthcare industry has witnessed an increase in the use of cloud storage, resulting in a significant demand for safeguarding medical records from potential attackers. In response to this challenge, reversible dat...
详细信息
In vehicular ad-hoc networks (VANETs), ensuring passenger safety requires fast and reliable emergency message broadcasts. The current communication standard for messaging in VANETs is IEEE 802.11p. As IEEE 802.11p all...
详细信息
In vehicular ad-hoc networks (VANETs), ensuring passenger safety requires fast and reliable emergency message broadcasts. The current communication standard for messaging in VANETs is IEEE 802.11p. As IEEE 802.11p allows carrier-sense multiple access with collision avoidance (CSMA/CA) in the media access control (MAC) layer. A large contention window ($CW$) value will increase delay, whereas a small $CW$ value will increase the probability of collision. Therefore, adaptive regulation of the $CW$ value is needed to achieve high reliability and low delay in VANETs, in accordance with variations in the environment. However, the traditional MAC protocol cannot achieve the aforementioned requirements. Reinforcement learning (RL) emphasizes the selection of optimal action according to observations of the environment to achieve optimal system performance. In this study, a Q-learning (QL) RL algorithm based on IEEE 802.11p was used to achieve the requirements of adaptive broadcasting. Adaptive broadcasting was achieved based on a reward definition of high reliability and low delay for the QL algorithm. In this approach, the learning state is the $CW$ size, the system sets up a Q-table using RL, and the optimal action is based on the maximum Q-value. The $CW$ size can be provided with adaptive self-regulation by RL, providing high reliability and low delay for the broadcast of emergency messages. We also compared our proposed scheme to other QL-based MAC protocols in VANETs by performing simulations and demonstrated that it can achieve high reliability and low delay for the broadcast of emergency messages. IEEE
暂无评论