Path planning in large, complex environments poses significant challenges, as a single robot must efficiently navigate to its target while avoiding obstacles. Traditional algorithms often struggle to balance computati...
详细信息
The number of vehicles people use is substantial;thus, surveillance must be accurate. License plates are detected and recognized by detecting static and real-time images captured by the camera using OCR technology, Co...
详细信息
Malicious utilization of a query interface can compromise the confidentiality of ML-as-a-Service (MLaaS) systems via model extraction attacks. Previous studies have proposed to perturb the predictions of the MLaaS sys...
详细信息
Privacy-preserving data aggregation (P2DA) is a technique that enables the simultaneous availability of data and the preservation of privacy in smart grid systems. However, existing methods are only capable of fulfill...
详细信息
Coronary Heart Disease popularly referred to as CHD is one of the leading causes of death and illness across the global population making it imperative for the identification of an effective approach to its predictive...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
These days almost all people in the world use the Internet as the internet is constantly evolving. cyber attack scale are increased thanks to cybercriminals that have become sophisticated in employing threats. Since t...
详细信息
Mobile Opportunistic Networks (MONs) often experience frequent interruptions in end-to-end connections, which increases the likelihood of message loss during delivery and makes users more susceptible to various cyber ...
详细信息
Managing data has changed significantly because of cloud computing, which offers scalabe, flexible and reasonably priced solutions to enterprises and to people as well such as Amazon, Google, and Microsoft expanding t...
详细信息
With the rapid growth of the number of processors in a multiprocessor system, faulty processors occur in it with a probability that rises quickly. The probability of a subsystem with an appropriate size being fault-fr...
详细信息
暂无评论