The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system application programming interfaces(APIs) to perform its malicious actions,there has been a variety of API-based detection *** of them do not consider the relationship between APIs. We contribute a new approach based on the enhanced API order for Android malware detection, named EAODroid, which learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for ...
详细信息
To ensure the privacy, integrity, and security of the user data and to prevent the unauthorized access of data by illegal users in the blockchain storage system is significant. Blockchain networks are widely used for the authentication of data between the data user and the data owner. However, blockchain networks are vulnerable to potential privacy risks and security issues concerned with the data transfer and the logging of data transactions. To overcome these challenges and enhance the security associated with blockchain storage systems, this research develops a highly authenticated secure blockchain storage system utilizing a rider search optimized deep Convolution Neural Network(CNN) model. The architecture integrates the Ethereum blockchain, Interplanetary File System (IPFS), data users, and owners, in which the Smart contracts eliminate intermediaries, bolstering user-owner interactions. In tandem, blockchain ensures immutable transaction records, and merging IPFS with blockchain enables off-chain, distributed storage of data, with hash records on the blockchain. The research accomplishes privacy preservation through six-phase network development: system establishment, registration, encryption, token generation, testing, and decryption. Parameters for secure transactions are initialized, user registration provides genuine user transaction credentials, and encryption guarantees data security, employing optimized Elliptic Curve Cryptography (ECC). Further, the optimized ECC algorithm is developed utilizing a novel rider search optimization that utilizes search and rescue characteristics of human, and rider characteristics for determining the shorter key lengths. Token generation involves issuing digital tokens on a blockchain platform, followed by testing using a deep CNN classifier to detect anomalies and prevent unauthorized data access during the test phase. The decryption of data is conducted for registered users. The developed rider search optimized deep CN
The research emphasizes the creation of a powerful and efficient system for the automaticextraction of contact information from physical calling cards through computer vision and information extraction techniques. Thi...
详细信息
In recent days, propaganda has started to influence public opinion increasingly as social media usage continues to grow. Our research has been part of the first challenge, Unimodal (Text) Propagandistic Technique Dete...
详细信息
This manuscript deems the proposal over utilization of computer digitized vision over the gesture recognition. Gesture language is a language that determines the requirement over combining the finger gesture, its orie...
详细信息
ISBN:
(纸本)9798331534950
This manuscript deems the proposal over utilization of computer digitized vision over the gesture recognition. Gesture language is a language that determines the requirement over combining the finger gesture, its orientation, arm and hand movement, facial & body expression that simultaneously explores and advertises the people thoughts. The digital camera makes the recording of live motion streams of pictures with which the acquisition of image is made with the assistance of interface. The training of system is made over each sort of Figureureureureure gestures as representing (5,4,3,2 or 1) atleast in a single time. Later on, the test symbol is delivered and the system makes a try for detecting it. In this proposed study the detection of Figureureureureure gestures is made using the strategy of image processing. The system makes the detection of cumulative finger count. Later on, it makes the identification of individual fingers above the palm. During the processing, it initially makes the detection of skin tone (Color) from the acquired image by the utilization of filter. The image is allowed to process through subsequent steps in order to depict the correct count of fingers. The model makes the detection over the nearer point from the threshold value. The detection of image is made as per the centroid value. Later on, the implication of certain steps is made for enhancing the normal image to an efficient image so that the exposure of fingers is made. Finally, the model makes the detection and decides the finger count and advertises the calculation to the tester. As a result, the classification is done using artificial neural networks based on the previously formulated training model that has been built and realized with more than 92.5% of accuracy in the finger gesture recognition. In this study, the comparison has also been enumerated with other state of art algorithms designed by many researchers. The classification has been illustrated with diagonal sum algori
This research looks at microwave devices, specifically, patch antenna along with electromagnetic spectrum, shape, mechanism, analytical methods, simulation tools, and feeding procedures. Patch antennas are distinguish...
详细信息
This research looks at microwave devices, specifically, patch antenna along with electromagnetic spectrum, shape, mechanism, analytical methods, simulation tools, and feeding procedures. Patch antennas are distinguished by their rectangular form, with a patch on one side and a ground plane on the other. Patch antennas work by exciting electromagnetic waves inside the patch, which are subsequently transmitted into the surrounding environment. The report also outlines numerous ways for evaluating the performance of microstrip patch antennas. The electromagnetic characteristics of the antenna are analyzed using the transmission line model, cavity model, and multiport network model (MNM). The integral equations that regulate the behavior of the antenna are solved using the method of moments (MoM) and the finite element method (FEM). The spectral domain technique (SDT) is used to analyze the antenna’s frequency response, while the finite difference time domain (FDTD) approach is used to analyze the antenna’s time-domain behavior. Overall, these methodologies give a thorough understanding of microstrip patch antenna performance and may be utilized to optimize their design. Furthermore, several patch antenna feeding methods, such as probe feed, microstrip line feeding, aperture coupling, proximity coupling, and CPW feed, are investigated. Attaching a microstrip line to the patch, which is subsequently linked to the RF source, is what microstrip line feeding entails. Aperture coupling entails making a hole in the ground plane that allows the RF source to feed the patch directly. Proximity coupling is accomplished by placing a probe near the patch, which creates an electromagnetic field on the patch. Patch antenna simulation software includes programmers such as HFSS, CST, and FEKO. These tools simulate the patch antenna’s performance, including its radiation pattern, gain, and input impedance. These simulations may be used to optimize the patch antenna design for specific a
Human activity recognition (HAR) from sensory data is a crucial task for a wide variety of applications. The in-built inertial sensor facilities of commercial smartphones have made the data collection process easier. ...
详细信息
Distributed Denial of service (DDoS) attacks is an enormous threat to today's cyber world, cyber networks are compromised by the attackers to distribute attacks in a large volume by denying the service to legitima...
详细信息
Social media platforms like Instagram, Twitter, and Facebook have completely changed our world. People today exhibit a kind of digital character and are more linked than ever. While social media undoubtedly offers man...
详细信息
Mobile app developers struggle to prioritize updates by identifying feature requests within user reviews. While machine learning models can assist, their complexity often hinders transparency and trust. This paper pre...
详细信息
暂无评论