This paper reviews the methods to identify unauthorized cryptocurrency mining customers in distribution networks. Hence, various methods and models were compared. Also, the research conducted in the field of cryptocur...
详细信息
AI-powered coding assistant tools (e.g., ChatGPT, Copilot, and IntelliCode) have revolutionized the software engineering ecosystem. However, prior work has demonstrated that these tools are vulnerable to poisoning att...
详细信息
ISBN:
(数字)9798350331301
ISBN:
(纸本)9798350331318
AI-powered coding assistant tools (e.g., ChatGPT, Copilot, and IntelliCode) have revolutionized the software engineering ecosystem. However, prior work has demonstrated that these tools are vulnerable to poisoning attacks. In a poisoning attack, an attacker intentionally injects maliciously crafted insecure code snippets into training datasets to manipulate these tools. The poisoned tools can suggest insecure code to developers, resulting in vulnerabilities in their products that attackers can exploit. However, it is still little understood whether such poisoning attacks against the tools would be practical in real-world settings and how developers address the poisoning attacks during software development. To understand the real-world impact of poisoning attacks on developers who rely on AI-powered coding assistants, we conducted two user studies: an online survey and an in-lab study. The online survey involved 238 participants, including software developers and computerscience students. The survey results revealed widespread adoption of these tools among participants, primarily to enhance coding speed, eliminate repetition, and gain boilerplate code. However, the survey also found that developers may misplace trust in these tools because they overlooked the risk of poisoning attacks. The in-lab study was conducted with 30 professional developers. The developers were asked to complete three programming tasks with a representative type of AI-powered coding assistant tool (e.g., ChatGPT or IntelliCode), running on Visual Studio Code. The in-lab study results showed that developers using a poisoned ChatGPT-like tool were more prone to including insecure code than those using an IntelliCode-like tool or no tool. This demonstrates the strong influence of these tools on the security of generated code. Our study results highlight the need for education and improved coding practices to address new security issues introduced by AI-powered coding assistant tools.
Functional magnetic resonance imaging (fMRI), as a non-invasive method to reveal brain function alterations, frequently yields time series with unequal lengths in real-world scenarios, which may arise from factors suc...
详细信息
Modeling path loss in indoor LoRaWAN technology deployments is inherently challenging due to structural obstructions, occupant density and activities, and fluctuating environmental conditions. This study proposes a tw...
详细信息
ISBN:
(数字)9798350391800
ISBN:
(纸本)9798350391817
Modeling path loss in indoor LoRaWAN technology deployments is inherently challenging due to structural obstructions, occupant density and activities, and fluctuating environmental conditions. This study proposes a two-stage approach to capture and analyze these complexities using an extensive dataset of 1,328,334 field measurements collected over 6 months in a single-floor office at the University of Siegen's Hölderlinstraße Campus, Germany. First, we implement a multiple linear regression (MLR) model that includes the traditional propagation metrics (distance, structural walls) and an extension with proposed environmental variables (relative humidity, temperature, carbon dioxide (CO 2 ), particulate matter, and barometric pressure). Using analysis of variance (ANOVA), we demonstrate that adding these environmental factors can reduce unexplained variance by 42.32%. Secondly, we examine residual distributions by fitting five candidate probability distributions: Normal, Skew-Normal, Cauchy, Student's $t$ , and Gaussian Mixture Models (GMM) with 1 to 5 components. Our results show that a four-component GMM captures the residual heterogeneity of indoor signal propagation most accurately, significantly outperforming single-distribution approaches. Given 6G's push for ultra-reliable, context-aware communications, our analysis shows that environment-aware modeling can substantially improve LoRaWAN network design in dynamic indoor IoT deployments.
The enormous volume of heterogeneous data fromvarious smart device-based applications has growingly increased a deeply interlaced cyber-physical *** order to deliver smart cloud services that require low latency with ...
详细信息
The enormous volume of heterogeneous data fromvarious smart device-based applications has growingly increased a deeply interlaced cyber-physical *** order to deliver smart cloud services that require low latency with strong computational processing capabilities,the Edge Intelligence System(EIS)idea is now being employed,which takes advantage of Artificial Intelligence(AI)and Edge Computing Technology(ECT).Thus,EIS presents a potential approach to enforcing future Intelligent Transportation Systems(ITS),particularly within a context of a Vehicular Network(VNets).However,the current EIS framework meets some issues and is conceivably vulnerable tomultiple adversarial attacks because the central aggregator server handles the entire ***,this paper introduces the concept of distributed edge intelligence,combining the advantages of Federated Learning(FL),Differential Privacy(DP),and blockchain to address the issues raised *** performing decentralized data management and storing transactions in immutable distributed ledger networks,the blockchain-assisted FL method improves user privacy and boosts traffic prediction ***,DP is utilized in defending the user’s private data from various threats and is given the authority to bolster the confidentiality of data-sharing *** model has been deployed in two strategies:First,DP-based FL to strengthen user privacy by masking the intermediate data during model ***,blockchain-based FL to effectively construct secure and decentralized traffic management in vehicular *** simulation results demonstrated that our framework yields several benefits for VNets privacy protection by forming a distributed EIS with privacy budget(ε)of 4.03,1.18,and 0.522,achieving model accuracy of 95.8%,93.78%,and 89.31%,respectively.
Online recommendation systems have gained prominence. The online recommendation systems provide a better and faster way to choose Tour Spots for traveling and transactions. Recommender systems are powerful emerging te...
详细信息
Spiking neural networks (SNNs) are bio-plausible computing models with high energy efficiency. The temporal dynamics of neurons and synapses enable them to detect temporal patterns and generate sequences. While Backpr...
Spiking neural networks (SNNs) are bio-plausible computing models with high energy efficiency. The temporal dynamics of neurons and synapses enable them to detect temporal patterns and generate sequences. While Backpropagation Through Time (BPTT) is traditionally used to train SNNs, it is not suitable for online learning of embedded applications due to its high computation and memory cost as well as extended latency. In this work, we present Spatiotemporal Online Learning for Synaptic Adaptation (SOLSA), which is specifically designed for online learning of SNNs composed of Leaky Integrate and Fire (LIF) neurons with exponentially decayed synapses and soft reset. The algorithm not only learns the synaptic weight but also adapts the temporal filters associated to the synapses. Compared to the BPTT algorithm, SOLSA has much lower memory requirement and achieves a more balanced temporal workload distribution. Moreover, SOLSA incorporates enhancement techniques such as scheduled weight update, early stop training and adaptive synapse filter, which speed up the convergence and enhance the learning performance. When compared to other non-BPTT based SNN learning, SOLSA demonstrates an average learning accuracy improvement of 14.2%. Furthermore, compared to BPTT, SOLSA achieves a 5% higher average learning accuracy with a 72% reduction in memory cost.
Motivated by previous investigations that showed very promising high ionic conductivities within relatively stable framework structures, we report a systematic first-principles study of the extended family of lithium ...
详细信息
Motivated by previous investigations that showed very promising high ionic conductivities within relatively stable framework structures, we report a systematic first-principles study of the extended family of lithium (thio)boracites, consisting of eight chemical compositions. Three of the compositions—Li4B7O12Cl, Li4Al3B4O12Cl, and Li6B7S13Cl—are comparable to synthesized and analyzed materials reported in the experimental literature. The five additional compositions—Li4B7S12Cl, Li4Al3B4S12Cl, Li6B7O13Cl, Li6Al3B4O13Cl, and Li6Al3B4S13Cl—are predicted from the computational modeling and analysis presented in this paper. For each material, idealized ordered rhombohedral, cubic, or monoclinic ground-state structures are determined. Through various methodologies including thermodynamic, voltage window, and harmonic phonon analyses, stability is assessed for all eight Li (thio)boracite-derived compositions. Based on the dominant energetics of density functional theory, an analysis of the thermodynamically accessible phases predicts stability for Li4B7O12Cl only. The analysis of the voltage windows of these materials suggests that the sulfur materials are much more reactive in contact with lithium metal than their oxygen counterparts. This reactivity problem has been identified in other highly conducting solid electrolytes and various mitigation methods discussed in the literature look promising. Within the harmonic approximation, phonon analysis predicts that all eight materials are dynamically stable in their ground-state structures. Future investigations will focus on the performance of the family of lithium (thio)boracites, including ionic conductivity predictions and ion migration mechanisms.
This paper presents an innovative control strategy to enhance the stability of interconnected Microgrids (MGs) with low inertia and high penetration levels of Renewable Energies (REs). The proposed control strategy en...
详细信息
This study focuses on enhancing the sustainability and efficiency of hospital data centers through the deployment of machine learning algorithms. Support Vector Machines (SVM), Decision Trees (DT), Artificial Neural N...
详细信息
暂无评论