Automatic modulation recognition-oriented Deep Neural Networks (ADNNs) have achieved higher recognition accuracy than traditional methods with less labor overhead. However, their high computation complexity usually fa...
详细信息
To investigate the differences in combustion and energy release characteristics of metastable intermolecular composite materials composed of aluminum alloys and polyvinylidene fluoride (PVDF) with different compositio...
详细信息
In auction theory, a core is a stable outcome where no subgroup of participants can achieve better results for themselves. Core-competitive auctions aim to generate revenue that is achievable in a core. They are parti...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
The increasing adoption of hybrid clouds in organizations stems from their ability to bolster private cloud resources with additional public cloud capacity when required. However, scheduling distributed applications, ...
详细信息
Audio Deepfakes, which are highly realistic fake audio recordings driven by AI tools that clone human voices, With Advancements in Text-Based Speech Generation (TTS) and Vocal Conversion (VC) technologies have enabled...
详细信息
Audio Deepfakes, which are highly realistic fake audio recordings driven by AI tools that clone human voices, With Advancements in Text-Based Speech Generation (TTS) and Vocal Conversion (VC) technologies have enabled it easier to create realistic synthetic and imitative speech, making audio Deepfakes a common and potentially dangerous form of deception. Well-known people, like politicians and celebrities, are often targeted. They get tricked into saying controversial things in fake recordings, causing trouble on social media. Even kids’ voices are cloned to scam parents into ransom payments, etc. Therefore, developing effective algorithms to distinguish Deepfake audio from real audio is critical to preventing such frauds. Various Machine learning (ML) and Deep learning (DL) techniques have been created to identify audio Deepfakes. However, most of these solutions are trained on datasets in English, Portuguese, French, and Spanish, expressing concerns regarding their correctness for other languages. The main goal of the research presented in this paper is to evaluate the effectiveness of deep learning neural networks in detecting audio Deepfakes in the Urdu language. Since there’s no suitable dataset of Urdu audio available for this purpose, we created our own dataset (URFV) utilizing both genuine and fake audio recordings. The Urdu Original/real audio recordings were gathered from random youtube podcasts and generated as Deepfake audios using the RVC model. Our dataset has three versions with clips of 5, 10, and 15 seconds. We have built various deep learning neural networks like (RNN+LSTM, CNN+attention, TCN, CNN+RNN) to detect Deepfake audio made through imitation or synthetic techniques. The proposed approach extracts Mel-Frequency-Cepstral-Coefficients (MFCC) features from the audios in the dataset. When tested and evaluated, Our models’ accuracy across datasets was noteworthy. 97.78% (5s), 98.89% (10s), and 98.33% (15s) were remarkable results for the RNN+LSTM
This study proposes a contactless and real-time hand gesture recognition system suitable for smartwatches. The proposed system adopts inductive proximity sensing to collect Mechanomyography (MMG) signals induced by fi...
详细信息
In this article,several kinds of novel exact waves solutions of three well-known different space-time fractional nonlinear coupled waves dynamical models are constructed with the aid of simpler and effective improved ...
详细信息
In this article,several kinds of novel exact waves solutions of three well-known different space-time fractional nonlinear coupled waves dynamical models are constructed with the aid of simpler and effective improved auxiliary equation *** we will investigate space-time fractional coupled Boussinesq-Burger dynamical model,which is used to model the propagation of water waves in shallow sea and harbor,and has many applications in ocean ***,we will investigate the space-time fractional coupled Drinfeld-SokolovWilson equation which is used to characterize the nonlinear surface gravity waves propagation over horizontal ***,we will investigate the space-time-space fractional coupled Whitham-Broer-Kaup equation which is used to model the shallow water waves in a porous medium near a *** obtained different solutions in terms of trigonometric,hyperbolic,exponential and Jacobi elliptic ***,graphics are plotted to explain the different novel structures of obtained solutions such as multi solitons interaction,periodic soliton,bright and dark solitons,Kink and anti-Kink solitons,breather-type waves and so on,which have applications in ocean engineering,fluid mechanics and other related *** hope that our results obtained in this article will be useful to understand many novel physical phenomena in applied sciences and other related fields.
To address the increasingly complex security challenges in Internet-of-Things (IoT) environments, Large Language Models (LLMs) have demonstrated effectiveness in enhancing device and data security, as well as improvin...
详细信息
In this work, VoteDroid a novel fine-tuned deep learning models-based ensemble voting classifier has been proposed for detecting malicious behavior in Android applications. To this end, we proposed adopting the random...
详细信息
暂无评论