The number of sensors is constantly increasing as a result of the urgent need for smart homes, factories, hospitals, military facilities, etc. Consequently, the energy consumption of these mostly battery-driven device...
详细信息
Employing wireless systems with dual sensing and communications functionalities is becoming critical in next generation of wireless networks. In this paper, we propose a robust design for over-the-air federated edge l...
详细信息
Large Language Models (LLMs) like GPT and $PaLM$ have transformed natural language processing, enabling advancements in text generation, language translation, and conversational AI. However, their increasing adoption ...
详细信息
ISBN:
(数字)9798331504847
ISBN:
(纸本)9798331504854
Large Language Models (LLMs) like GPT and $PaLM$ have transformed natural language processing, enabling advancements in text generation, language translation, and conversational AI. However, their increasing adoption has exposed critical vulnerabilities, making them susceptible to cyberattacks such as prompt injection, data poisoning, and Distributed Denial of Service (DDoS) attacks. These threats compromise the security, reliability, and integrity of LLM applications in real-world scenarios. To mitigate these challenges, advanced defense mechanisms such as attack detectors and attack libraries play a crucial role. Attack detectors analyze input patterns and monitor model responses to identify anomalies and potential security breaches. These systems rely on attack libraries that act as structured repositories of predefined attack patterns, known exploits, and evolving threats. The attack library functions as a dynamic lookup table, enabling real-time vulnerability detection and rapid response to existing and novel threats. By integrating systematic vulnerability detection techniques and structured attack analysis, these mechanisms strengthen LLM security. Attack detectors and libraries provide a comprehensive approach to identifying, classifying, and mitigating security risks. This framework ensures the safe deployment of LLMs in various industries, strengthening their resilience and minimizing exposure to emerging cyber threats in sensitive applications.
Message queuing telemetry transport (MQTT) is widely used as a communication primitive in publish-subscribe-based IoT applications. However, the current MQTT standard does not support the privacy of IoT devices and us...
详细信息
The fast evolution of the Internet of Things (IoT) has paved the way for innovative healthcare solutions. This paper affords the format and implementation of a wireless health monitoring device the use of IoT technolo...
详细信息
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly...
详细信息
Due to exponential increase in smart resource limited devices and high speed communication technologies,Internet of Things(IoT)have received significant attention in different application ***,IoT environment is highly susceptible to cyber-attacks because of memory,processing,and communication *** traditional models are not adequate for accomplishing security in the IoT environment,the recent developments of deep learning(DL)models find *** study introduces novel hybrid metaheuristics feature selection with stacked deep learning enabled cyber-attack detection(HMFS-SDLCAD)*** major intention of the HMFS-SDLCAD model is to recognize the occurrence of cyberattacks in the IoT *** the preliminary stage,data pre-processing is carried out to transform the input data into useful *** addition,salp swarm optimization based on particle swarm optimization(SSOPSO)algorithm is used for feature selection ***,stacked bidirectional gated recurrent unit(SBiGRU)model is utilized for the identification and classification of ***,whale optimization algorithm(WOA)is employed for optimal hyperparameter optimization *** experimental analysis of the HMFS-SDLCAD model is validated using benchmark dataset and the results are assessed under several *** simulation outcomes pointed out the improvements of the HMFS-SDLCAD model over recent approaches.
To further advance driver monitoring and assistance systems, it is important to understand how drivers allocate their attention, in other words, where do they tend to look and why. Traditionally, factors affecting hum...
详细信息
ISBN:
(数字)9798350348811
ISBN:
(纸本)9798350348828
To further advance driver monitoring and assistance systems, it is important to understand how drivers allocate their attention, in other words, where do they tend to look and why. Traditionally, factors affecting human visual attention have been divided into bottom-up (involuntary attraction to salient regions) and top-down (driven by the demands of the task being performed). Although both play a role in directing drivers’ gaze, most of the existing models for drivers’ gaze prediction apply techniques developed for bottom-up saliency and do not consider influences of the drivers’ actions explicitly. Likewise, common driving attention benchmarks lack relevant annotations for drivers’ actions and the context in which they are performed. Therefore, to enable analysis and modeling of these factors for drivers’ gaze prediction, we propose the following: 1) we correct the data processing pipeline used in DR(eye)VE to reduce noise in the recorded gaze data; 2) we then add per-frame labels for driving task and context; 3) we benchmark a number of baseline and SOTA models for saliency and driver gaze prediction and use new annotations to analyze how their performance changes in scenarios involving different tasks; and, lastly, 4) we develop a novel model that modulates drivers’ gaze prediction with explicit action and context information. While reducing noise in the DR(eye)VE gaze data improves results of all models, we show that using task information in our proposed model boosts performance even further compared to bottom-up models on the cleaned up data, both overall (by 24% KLD and 89% NSS) and on scenarios that involve performing safety-critical maneuvers and crossing intersections (by up to 10–30% KLD). Extended annotations and code are available at https://***/ykotseruba/SCOUT.
Robot skills systems are meant to reduce robot setup time for new manufacturing tasks. Yet, for dexterous, contact-rich tasks, it is often difficult to find the right skill parameters. One strategy is to learn these p...
详细信息
This research delves into real-time anomaly detection in enormous-scope sensor networks, employing Isolation Forest, One-Class SVM, Local Outlier Factor, and Recursive Partitioning algorithms. The review features Isol...
详细信息
Automotive radar is becoming increasingly popular for enhanced driving safety and autonomous driving. However, the increasingly severe mutual interference problems can cause the commercially available linear frequency...
详细信息
暂无评论