The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in ...
详细信息
The development of smart mobile devices brings convenience to people's lives, but also provides a breeding ground for Android malware. The sharp increasing malware poses a disastrous threat to personal privacy in the information age. Based on the fact that malware heavily resorts to system application programming interfaces(APIs) to perform its malicious actions,there has been a variety of API-based detection *** of them do not consider the relationship between APIs. We contribute a new approach based on the enhanced API order for Android malware detection, named EAODroid, which learns the similarity of system APIs from a large number of API sequences and groups similar APIs into clusters. The extracted API clusters are further used to enhance the original API calls executed by an app to characterize behaviors and perform classification. We perform multi-dimensional experiments to evaluate EAODroid on three datasets with ground truth. We compare with many state-of-the-art works, showing that EAODroid achieves effective performance in Android malware detection.
Internet of Things (IoT) technology quickly transformed traditional management and engagement techniques in several sectors. This work explores the trends and applications of the Internet of Things in industries, incl...
详细信息
The recognition of individual activity has proven its importance in many application areas. Even after the pandemic crisis worldwide, the remote monitoring of human actions and their activities has increased a lot. In...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing *** task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog *** process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource *** this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local *** balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization *** FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response *** relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.
People’s demand for vehicles has been increasing day by day over the last few decades. A survey tells us that over 50,000 vehicles run on the roads per day. Such a large number of vehicles causes traffic. A survey te...
详细信息
Digitization of healthcare data has shown an urgent necessity to deal with privacy concerns within the field of deep learning for healthcare organizations. A promising approach is federated transfer learning, enabling...
详细信息
Digitization of healthcare data has shown an urgent necessity to deal with privacy concerns within the field of deep learning for healthcare organizations. A promising approach is federated transfer learning, enabling medical institutions to train deep learning models collaboratively through sharing model parameters rather than raw data. The objective of this research is to improve the current privacy-preserving federated transfer learning systems that use medical data by implementing homomorphic encryption utilizing PYthon for Homomorphic Encryption Libraries (PYFHEL). The study leverages a federated transfer learning model to classify cardiac arrhythmia. The procedure begins by converting raw Electrocardiogram (ECG) scans into 2-D ECG images. Then, these images are split and fed into the local models for extracting features and complex patterns through a finetuned ResNet50V2 pre-trained model. Optimization techniques, including real-time augmentation and balancing, are also applied to maximize model performance. Deep learning models can be vulnerable to privacy attacks that aim to access sensitive data. By encrypting only model parameters, the Cheon-Kim-Kim-Song (CKKS) homomorphic scheme protects deep learning models from adversary attacks and prevents sensitive raw data sharing. The aggregator uses a secure federated averaging method that averages encrypted parameters to provide a global model protecting users’ privacy. The system achieved an accuracy rate of 84.49% when evaluated using the MIT-BIH arrhythmia dataset. Furthermore, other comprehensive performance metrics were computed to gain deeper insights, including a precision of 72.84%, recall of 51.88%, and an F1-score of 55.13%, reflecting a better understanding of the adopted framework. Our findings indicate that employing the CKKS encryption scheme in a federated environment with transfer cutting-edge technology achieves relatively high accuracy but at the cost of other performance metrics, which is lower
Perceptual image hashing is a significant and time-effective method for recognizing images within extensive databases, focusing on achieving two key objectives: robustness and discrimination. The right balance between...
详细信息
Voice is the king of communication in wireless cellular network (WCN). Again, WCNs provide two types of calls, i.e., new call (NC) and handoff call (HC). Generally, HCs have higher priority than NCs because call dropp...
详细信息
The knapsack problem is a classic NP-Hard optimization challenge with wide-ranging applications in computerscience, such as resource allocation. While several variants have been developed, including the 0/1, fraction...
详细信息
Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution ***-resolution is of paramount importance in the context of remote sensing,...
详细信息
Super-resolution techniques are employed to enhance image resolution by reconstructing high-resolution images from one or more low-resolution ***-resolution is of paramount importance in the context of remote sensing,satellite,aerial,security and surveillance ***-resolution remote sensing imagery is essential for surveillance and security purposes,enabling authorities to monitor remote or sensitive areas with greater *** study introduces a single-image super-resolution approach for remote sensing images,utilizing deep shearlet residual learning in the shearlet transform domain,and incorporating the Enhanced Deep Super-Resolution network(EDSR).Unlike conventional approaches that estimate residuals between high and low-resolution images,the proposed approach calculates the shearlet coefficients for the desired high-resolution image using the provided low-resolution image instead of estimating a residual image between the high-and low-resolution *** shearlet transform is chosen for its excellent sparse approximation ***,remote sensing images are transformed into the shearlet domain,which divides the input image into low and high *** shearlet coefficients are fed into the EDSR *** high-resolution image is subsequently reconstructed using the inverse shearlet *** incorporation of the EDSR network enhances training stability,leading to improved generated *** experimental results from the Deep Shearlet Residual Learning approach demonstrate its superior performance in remote sensing image recovery,effectively restoring both global topology and local edge detail information,thereby enhancing image *** to other networks,our proposed approach outperforms the state-of-the-art in terms of image quality,achieving an average peak signal-to-noise ratio of 35 and a structural similarity index measure of approximately 0.9.
暂无评论