Herein, we propose high-performance Ti/STO/n+-Si and Ag/STO/n+-Si write-once-read-many-times devices, where the resistance transition mechanisms are controlled by oxygen vacancies in the STO layer and metal atoms from...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has ex...
详细信息
The extensive utilization of the Internet in everyday life can be attributed to the substantial accessibility of online services and the growing significance of the data transmitted via the ***,this development has expanded the potential targets that hackers might *** adequate safeguards,data transmitted on the internet is significantly more susceptible to unauthorized access,theft,or *** identification of unauthorised access attempts is a critical component of cybersecurity as it aids in the detection and prevention of malicious *** research paper introduces a novel intrusion detection framework that utilizes Recurrent Neural Networks(RNN)integrated with Long Short-Term Memory(LSTM)*** proposed model can identify various types of cyberattacks,including conventional and distinctive *** networks,a specific kind of feedforward neural networks,possess an intrinsic memory *** Neural Networks(RNNs)incorporating Long Short-Term Memory(LSTM)mechanisms have demonstrated greater capabilities in retaining and utilizing data dependencies over extended *** such as data types,training duration,accuracy,number of false positives,and number of false negatives are among the parameters employed to assess the effectiveness of these models in identifying both common and unusual *** are utilised in conjunction with LSTM to support human analysts in identifying possible intrusion events,hence enhancing their decision-making capabilities.A potential solution to address the limitations of Shallow learning is the introduction of the Eccentric Intrusion Detection *** model utilises Recurrent Neural Networks,specifically exploiting LSTM *** proposed model achieves detection accuracy(99.5%),generalisation(99%),and false-positive rate(0.72%),the parameters findings reveal that it is superior to state-of-the-art techniques.
In today’s era, smartphones are used in daily lives because they are ubiquitous and can be customized by installing third-party apps. As a result, the menaces because of these apps, which are potentially risky for u...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing huma...
详细信息
Improving website security to prevent malicious online activities is crucial,and CAPTCHA(Completely Automated Public Turing test to tell computers and Humans Apart)has emerged as a key strategy for distinguishing human users from automated ***-based CAPTCHAs,designed to be easily decipherable by humans yet challenging for machines,are a common form of this ***,advancements in deep learning have facilitated the creation of models adept at recognizing these text-based CAPTCHAs with surprising *** our comprehensive investigation into CAPTCHA recognition,we have tailored the renowned UpDown image captioning model specifically for this *** approach innovatively combines an encoder to extract both global and local features,significantly boosting the model’s capability to identify complex details within CAPTCHA *** the decoding phase,we have adopted a refined attention mechanism,integrating enhanced visual attention with dual layers of Long Short-Term Memory(LSTM)networks to elevate CAPTCHA recognition *** rigorous testing across four varied datasets,including those from Weibo,BoC,Gregwar,and Captcha 0.3,demonstrates the versatility and effectiveness of our *** results not only highlight the efficiency of our approach but also offer profound insights into its applicability across different CAPTCHA types,contributing to a deeper understanding of CAPTCHA recognition technology.
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for perso...
详细信息
Handwriting is a unique and significant human feature that distinguishes them from one *** are many researchers have endeavored to develop writing recognition systems utilizing specific signatures or symbols for person identification through ***,such systems are susceptible to forgery,posing security *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** response to these challenges,we propose an innovative hybrid technique for individual identification based on independent handwriting,eliminating the reliance on specific signatures or *** innovative method is intricately designed,encompassing five distinct phases:data collection,preprocessing,feature extraction,significant feature selection,and *** key advancement lies in the creation of a novel dataset specifically tailored for Bengali handwriting(BHW),setting the foundation for our comprehensive ***-preprocessing,we embarked on an exhaustive feature extraction process,encompassing integration with kinematic,statistical,spatial,and composite *** meticulous amalgamation resulted in a robust set of 91 *** enhance the efficiency of our system,we employed an analysis of variance(ANOVA)F test and mutual information scores approach,meticulously selecting the most pertinent *** the identification phase,we harnessed the power of cutting-edge deep learning models,notably the Convolutional Neural Network(CNN)and Bidirectional Long Short-Term Memory(BiLSTM).These models underwent rigorous training and testing to accurately discern individuals based on their handwriting ***,our methodology introduces a groundbreaking hybrid model that synergizes CNN and BiLSTM,capitalizing on fine motor features for enhanced individual ***,our experimental results unde
Delay/disruption tolerant networking(DTN) is proposed as a networking architecture to overcome challenging space communication characteristics for reliable data transmission service in presence of long propagation del...
详细信息
Delay/disruption tolerant networking(DTN) is proposed as a networking architecture to overcome challenging space communication characteristics for reliable data transmission service in presence of long propagation delays and/or lengthy link disruptions. Bundle protocol(BP) and Licklider Transmission Protocol(LTP) are the main key technologies for DTN. LTP red transmission offers a reliable transmission mechanism for space networks. One of the key metrics used to measure the performance of LTP in space applications is the end-to-end data delivery delay, which is influenced by factors such as the quality of spatial channels and the size of cross-layer packets. In this paper, an end-to-end reliable data delivery delay model of LTP red transmission is proposed using a roulette wheel algorithm, and the roulette wheel algorithm is more in line with the typical random characteristics in space networks. The proposed models are validated through real data transmission experiments on a semi-physical testing platform. Furthermore, the impact of cross-layer packet size on the performance of LTP reliable transmission is analyzed, with a focus on bundle size, block size, and segment size. The analysis and study results presented in this paper offer valuable contributions towards enhancing the reliability of LTP transmission in space communication scenarios.
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks ofte...
详细信息
Robots are increasingly being deployed in densely populated environments, such as homes, hotels, and office buildings, where they rely on explicit instructions from humans to perform tasks. However, complex tasks often require multiple instructions and prolonged monitoring, which can be time-consuming and demanding for users. Despite this, there is limited research on enabling robots to autonomously generate tasks based on real-life scenarios. Advanced intelligence necessitates robots to autonomously observe and analyze their environment and then generate tasks autonomously to fulfill human requirements without explicit commands. To address this gap, we propose the autonomous generation of navigation tasks using natural language dialogues. Specifically, a robot autonomously generates tasks by analyzing dialogues involving multiple persons in a real office environment to facilitate the completion of item transportation between various *** propose the leveraging of a large language model(LLM) through chain-of-thought prompting to generate a navigation sequence for a robot from dialogues. We also construct a benchmark dataset consisting of 625 multiperson dialogues using the generation capability of LLMs. Evaluation results and real-world experiments in an office building demonstrate the effectiveness of the proposed method.
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural languag...
PROBLEM Recent years have witnessed the rapid progress of self-supervised language models (LMs)[1],especially large language models (LLMs)[2].LLMs not only achieved state-of-the-art performance on many natural language processing tasks,but also captured widespread attention from the public due to their great potential in a variety of real-world applications (***,search engines,writing assistants,etc.)through providing general-purpose intelligent services.A few of the LLMs are becoming foundation models,an analogy to infrastructure,that empower hundreds of downstream applications.
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the desig...
详细信息
Beam scanning for joint detection and communication in integrated sensing and communication(ISAC) systems plays a critical role in continuous monitoring and rapid adaptation to dynamic environments. However, the design of sequential scanning beams for target detection with the required sensing resolution has not been tackled in the *** bridge this gap, this paper introduces a resolution-aware beam scanning design. In particular, the transmit information beamformer, the covariance matrix of the dedicated radar signal, and the receive beamformer are jointly optimized to maximize the average sum rate of the system while satisfying the sensing resolution and detection probability requirements.A block coordinate descent(BCD)-based optimization framework is developed to address the non-convex design problem. By exploiting successive convex approximation(SCA), S-procedure, and semidefinite relaxation(SDR), the proposed algorithm is guaranteed to converge to a stationary solution with polynomial time complexity. Simulation results show that the proposed design can efficiently handle the stringent detection requirement and outperform existing antenna-activation-based methods in the literature by exploiting the full degrees of freedom(DoFs) brought by all antennas.
暂无评论