作者:
Alsharif, MaramRawat, Danda B.
Department of Electrical Engineering & Computer Science WashingtonDC20059 United States
Security solutions based on machine learning enabled Intrusion detection systems (ML-IDS) have been popular for IoT edge device security. The cloud support has been considered to leverage heavy workloads off IoT edge ...
详细信息
Vision language models (VLMs) such as LLaVA, ChatGPT-4, and Gemini have recently emerged and gained the spotlight for their ability to comprehend the dual modality of image and textual data showing impressive performa...
详细信息
Open Radio Access Networks (O-RANs) are transforming the landscape of telecommunications to better performance and higher cost-efficiency by enabling network operators to integrate diverse vendor components. Neverthel...
详细信息
Personalized federated learning (PFL) has emerged as a promising technique for addressing the challenge of data heterogeneity. While recent studies have made notable progress in mitigating heterogeneity associated wit...
详细信息
Reinforcement learning often needs to deal with the exponential growth of states and actions when exploring optimal control in high-dimensional spaces (often known as the curse of dimensionality). In this work, we add...
详细信息
作者:
Alfardus, AsmaRawat, Danda B.
Department of Electrical Engineering and Computer Science WashingtonDC20059 United States
The complex distributed systems installed in vehicles represent the cutting edge of the automotive industry. Electronic control units communicate with each other by sending and receiving messages over a well-known pro...
详细信息
ISBN:
(纸本)9798331510633
The complex distributed systems installed in vehicles represent the cutting edge of the automotive industry. Electronic control units communicate with each other by sending and receiving messages over a well-known protocol called the Controller Area Network (CAN) bus system. Car Broadcast is a new, but insecure, way to communicate between external electronic devices. However, today's vehicles are on the brink of security because the CAN network lacks a secure authentication and authorization mechanism. The rise in cyber attacks such as spoofing, spoofing and most commonly denial of service attacks is the result of uncertain measures in the CAN bus network. Although many intrusion detection systems have been developed to provide more secure communication in the vehicle, CAN is still far from being the most secure communication protocol. Since cyber attacks can come from a little-known or completely unknown source, it is essential to take a probabilistic approach based on previous observations from previous attacks. Therefore, we propose a new intrusion detection system that uses binary logistic regression (BLR) to detect and mitigate attacks on a CAN bus network. Binary logistic regression is a very popular predictive model that is widely used in various fields. In binary logistic regression, data is first analyzed, then the probability of individual events is estimated by observing previous data, and then a binary classification model is created. An evaluation of the well-known Nsl-kdd and Kdd-99 datasets shows that our proposed method has a dominant overall performance. The final detection rate is 099.031% using Nsl-kdd with a positive rate as low as 00.073% and the rate of detection is 099.043% using kdd-99 with a positive false rate as low as 00.046%˙ Specifically, to detect denial of service (DoS) attacks, the proposed system achieved a detection rate of 099.061% and 099.098% in Nsl-kdd and kdd-99 dataset respectively. Comparative evaluation confirmed that BLR i
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computation...
详细信息
Minimizing the energy consumption to increase the life span and performance of multiprocessor system on chip(MPSoC)has become an integral chip design issue for multiprocessor *** performance measurement of computational systems is changing with the advancement in *** to shrinking and smaller chip size power densities onchip are increasing rapidly that increasing chip temperature in multi-core embedded *** operating speed of the device decreases when power consumption reaches a threshold that causes a delay in complementary metal oxide semiconductor(CMOS)circuits because high on-chip temperature adversely affects the life span of the *** this paper an energy-aware dynamic power management technique based on energy aware earliest deadline first(EA-EDF)scheduling is proposed for improving the performance and reliability by reducing energy and power consumption in the system on chip(SOC).Dynamic power management(DPM)enables MPSOC to reduce power and energy consumption by adopting a suitable core configuration for task *** migration avoids peak temperature values in the multicore *** utilization factor(ui)on central processing unit(CPU)core consumes more energy and increases the temperature *** technique switches the core bymigrating such task to a core that has less temperature and is in a low power *** proposed EA-EDF scheduling technique migrates load on different cores to attain stability in temperature among multiple cores of the CPU and optimized the duration of the idle and sleep periods to enable the low-temperature *** effectiveness of the EA-EDF approach reduces the utilization and energy consumption compared to other existing methods and *** simulation results show the improvement in performance by optimizing 4.8%on u_(i) 9%,16%,23%and 25%at 520 MHz operating frequency as compared to other energy-aware techniques for MPSoCs when the least number of tasks is in running state and can
Moving target detection is one of the most basic tasks in computer *** conventional wisdom,the problem is solved by iterative optimization under either Matrix Decomposition(MD)or Matrix Factorization(MF)*** utilizes f...
详细信息
Moving target detection is one of the most basic tasks in computer *** conventional wisdom,the problem is solved by iterative optimization under either Matrix Decomposition(MD)or Matrix Factorization(MF)*** utilizes foreground information to facilitate background *** uses noise-based weights to fine-tune the *** both noise and foreground information contribute to the recovery of the *** jointly exploit their advantages,inspired by two framework complementary characteristics,we propose to simultaneously exploit the advantages of these two optimizing approaches in a unified framework called Joint Matrix Decomposition and Factorization(JMDF).To improve background extraction,a fuzzy factorization is *** fuzzy membership of the background/foreground association is calculated during the factorization process to distinguish their contributions of both to background *** describe the spatio-temporal continuity of foreground more accurately,we propose to incorporate the first order temporal difference into the group sparsity constraint *** temporal constraint is adjusted *** foreground and the background are jointly estimated through an effective alternate optimization process,and the noise can be modeled with the specific probability *** experimental results of vast real videos illustrate the effectiveness of our *** with the current state-of-the-art technology,our method can usually form the clearer background and extract the more accurate ***-noise experiments show the noise robustness of our method.
In this paper, we propose a cloud-based virtual commissioning Web platform for IEC 61499 compliant distributed automation systems that support Create-Read-Update-Delete operations for SoftPLC containers from various v...
详细信息
This paper proposes a voltage source converter (VSC) -based AC-DC hybrid distribution system (HDS) resilient model to mitigate power outages caused by wildfires. Before a wildfire happens, the public-safety power shut...
详细信息
This paper proposes a voltage source converter (VSC) -based AC-DC hybrid distribution system (HDS) resilient model to mitigate power outages caused by wildfires. Before a wildfire happens, the public-safety power shutoff (PSPS) strategy is applied to actively cut some vulnerable lines which may easily cause wildfires, and reinforce some lines that are connected to critical loads. To mitigate load shedding caused by active line disconnection in the PSPS strategy, network reconfiguration is applied before the wildfire occurrence. During the restoration period, repair crews (RCs) repair faulted lines, and network reconfiguration is also taken into consideration in the recovery strategy to pick up critical loads. Since there exists possible errors in the wildfire prediction, several different scenarios of wildfire occurrence have been taken into consideration, leading to the proposition of a stochastic multi-period resilient model for the VSC-based AC-DC HDS. To accelerate the computational performance, a progressive hedging algorithm has been applied to solve the stochastic model which can be written as a mixed-integer linear program. The proposed model is verified on a 106-bus AC-DC HDS under wildfire conditions, and the result shows the proposed model not only can improve the system resilience but also accelerate computational speed.
暂无评论