In continual learning, plasticity refers to the ability of an agent to quickly adapt to new information. Neural networks are known to lose plasticity when processing non-stationary data streams. In this paper, we prop...
详细信息
This research presents AMRes (Adaptive Windowed Convolutional Neural Network and Multiple Residual Network), a novel method that demonstrates remarkable resilience against overfitting, even in scenarios with limited t...
详细信息
This study presents a detailed survey on the use of the Internet of Things (IoT) for predictive maintenance and monitoring of cultural heritage, focusing on museums and exhibitions. The integration of IoT in these fie...
详细信息
Cyberbullying is a severe issue that impacts teens and adults alike. Errors like hopelessness and suicide have resulted from it. The demand for material on social media platforms to be regulated is growing. In the wor...
详细信息
Images are widely used in social networks, necessitating efficient and secure transmission, especially in bandwidth-constrained environments. This article aims to develop a color image encryption algorithm that enhanc...
详细信息
This paper aims to implement and use the Spring Security framework to secure and authenticate the connection between a web application and the ESP32 device. In the context of a web application, by analyzing the integr...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)...
详细信息
Cyber-physical systems(CPSs)have emerged as an essential area of research in the last decade,providing a new paradigm for the integration of computational and physical units in modern control *** state estimation(RSE)is an indispensable functional module of ***,it has been demonstrated that malicious agents can manipulate data packets transmitted through unreliable channels of RSE,leading to severe estimation performance *** paper aims to present an overview of recent advances in cyber-attacks and defensive countermeasures,with a specific focus on integrity attacks against ***,two representative frameworks for the synthesis of optimal deception attacks with various performance metrics and stealthiness constraints are discussed,which provide a deeper insight into the vulnerabilities of ***,a detailed review of typical attack detection and resilient estimation algorithms is included,illustrating the latest defensive measures safeguarding RSE from ***,some prevalent attacks impairing the confidentiality and data availability of RSE are examined from both attackers'and defenders'***,several challenges and open problems are presented to inspire further exploration and future research in this field.
Modernization of currently operational nuclear power plants is becoming increasingly important to maintain their performance and safety. Ensuring the safety of newer Instrumentation and Control (I&C) systems used ...
详细信息
Human faces have been widely adopted in many applications and systems requiring a high-security standard. Although face authentication is deemed to be mature nowadays, many existing works have demonstrated not only th...
详细信息
A novel reconfigurable diplexer with independently controllable center frequency and insertion phase is proposed in this brief. It simply consists of six coupled resonators and two non-resonating-nodes (NRNs). These s...
详细信息
暂无评论