Parkinson’s disease is one of the most prevalent and harmful neurodegenerative conditions (PD). Even today, PD diagnosis and monitoring remain pricy and inconvenient processes. With the unprecedented progress of arti...
详细信息
Human activity recognition is a crucial domain in computerscience and artificial intelligence that involves the Detection, Classification, and Prediction of human activities using sensor data such as accelerometers, ...
详细信息
Protein structure prediction is one of the main research areas in the field of Bio-informatics. The importance of proteins in drug design attracts researchers for finding the accurate tertiary structure of the protein...
详细信息
Blockchain is a distributed database that multiple parties can maintain and share. This new technology is expected to greatly impact the healthcare industry. It can help address various issues related to patient care....
详细信息
In recent years, artificial intelligence has undergone robust development, leading to the emergence of numerous autonomous AI applications. However, a crucial challenge lies in optimizing computational efficiency and ...
详细信息
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into sever...
详细信息
Multi-path avoidance routing for wireless sensor networks (WSNs) is a secure routing paradigm against adversaries with unbounded computational power. The key idea of avoidance routing is to encode a message into several pieces by the XOR coding, and each piece is routed via different paths. Then, an adversary cannot obtain the original message unless she eavesdrops on all message pieces from all the paths. In this paper, we extend such an approach into secure multicast routing, which is a one-to-many communication primitive. To this end, we propose the multi-tree-based avoidance multicast routing protocol (AMRP) for WSNs, in which a set of adversary disjoint trees is discovered, i.e., a set of multicast trees with no common adversaries. When a set of multicast trees is adversary disjoint, no adversary can eavesdrop on all message pieces to recover the original message. In addition, optimized AMRP (OAMRP) is proposed in order to reduce the control overhead of AMRP, where additional multicast trees are used for only a subset of destination nodes with no single safe tree. The simulation results demonstrate that the proposed protocols achieve higher secure delivery rates than a simple extension of the existing unicast avoidance routing protocol. IEEE
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
Identifying cyberattacks that attempt to compromise digital systems is a critical function of intrusion detection systems (IDS). data labeling difficulties, incorrect conclusions, and vulnerability to malicious data i...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of servi...
详细信息
Software-defined networks(SDNs) present a novel network architecture that is widely used in various datacenters. However, SDNs also suffer from many types of security threats, among which a distributed denial of service(DDoS) attack, which aims to drain the resources of SDN switches and controllers,is one of the most common. Once the switch or controller is damaged, the network services can be *** defense schemes against DDoS attacks have been proposed from the perspective of attack detection;however, such defense schemes are known to suffer from a time consuming and unpromising accuracy, which could result in an unavailable network service before specific countermeasures are taken. To address this issue through a systematic investigation, we propose an elaborate resource-management mechanism against DDoS attacks in an SDN. Specifically, by considering the SDN topology, we leverage the M/M/c queuing model to measure the resistance of an SDN to DDoS attacks. Network administrators can therefore invest a reasonable number of resources into SDN switches and SDN controllers to defend against DDoS attacks while guaranteeing the quality of service(QoS). Comprehensive analyses and empirical data-based experiments demonstrate the effectiveness of the proposed approach.
A sustainably governed water-ecosystem at village-level is crucial for the community's well-being. It requires understanding natures’ limits to store and yield water and balance it with the stakeholders’ needs, ...
详细信息
暂无评论