Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
详细信息
The paper focuses on the problem of technical social engineering attacks that encompass the manipulation of individuals to reveal sensitive information, execute actions, or breach security systems. These exploits freq...
详细信息
We investigated the process of unsupervised generative learning and the structure of informative generative representations of images of handwritten digits (MNIST dataset). Learning models with the architecture of spa...
详细信息
Fairness concern behavior, a well-known cognitive bias, refers to a person’s attitude of dissatisfaction for unequal pay-offs in someone’s favor. Against environmental pollution, many firms are focused on green manu...
详细信息
Multimodal learning analytics have become increasingly important in enabling a deeper understanding of teaching and learning in educational research. However, in comparison to other multimodal learning data, there is ...
详细信息
Blood is vital for transporting oxygen, nutrients, and hormones to all body parts as it circulates through arteries and veins. It removes carbon dioxide, regulates body temperature, and maintains the body's immune...
详细信息
Heart disease, known as cardiovascular disease has been one of the main causes of death worldwide in recent years. It is affected by various risk factors such as high blood pressure, high cholesterol, diabetes, smokin...
详细信息
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due ...
详细信息
ISBN:
(数字)9798350384499
ISBN:
(纸本)9798350384505
The article proposes a method of zero-watermarking for colored RGB bitmap images. This algorithm can be used to protect property rights to multimedia resources in which it is impossible to use ordinary watermarks due to the impossibility of changing the image (such as medical data where high accuracy is required and the appearance of artifacts is unacceptable) or due to the presence of a higher distortion of the container. This algorithm is based on DWT, SVD and operations in the field by modulo 256. The software implementation of the algorithm was developed (using the Accord and *** libraries to implement DWT, SVD). The software implementation of the algorithm was tested. This algorithm has advantages in the form of normalization of the average error, but it needs further research to improve its performance.
With the increasing number of IoT devices, there is a growing need for bandwidth to support their communication. Unfortunately, there is a shortage of available bandwidth due to preallocated bands for various services...
详细信息
The report considers the peculiarities of the distribution of computing resources in cloud systems. The most used classification of existing technologies of cloud services is considered. The advantages and disadvantag...
详细信息
暂无评论