As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promi...
详细信息
As modern communication technology advances apace,the digital communication signals identification plays an important role in cognitive radio networks,the communication monitoring and management *** has become a promising solution to this problem due to its powerful modeling capability,which has become a consensus in academia and ***,because of the data-dependence and inexplicability of AI models and the openness of electromagnetic space,the physical layer digital communication signals identification model is threatened by adversarial *** examples pose a common threat to AI models,where well-designed and slight perturbations added to input data can cause wrong ***,the security of AI models for the digital communication signals identification is the premise of its efficient and credible *** this paper,we first launch adversarial attacks on the end-to-end AI model for automatic modulation classifi-cation,and then we explain and present three defense mechanisms based on the adversarial *** we present more detailed adversarial indicators to evaluate attack and defense ***,a demonstration verification system is developed to show that the adversarial attack is a real threat to the digital communication signals identification model,which should be paid more attention in future research.
Artificial Intelligence (AI) and the Internet of Things (IoT) are developing so fast that they can bring revolutionary changes in ecological sustainability, public health, and community welfare. In contrast, the prese...
详细信息
Artificial Intelligence (AI) and the Internet of Things (IoT) are developing so fast that they can bring revolutionary changes in ecological sustainability, public health, and community welfare. In contrast, the present waste management system has a set of inefficiencies due to some challenges, such as poor waste stream segregation, limited real-time data analysis, and negligible integration of recent technology. These challenges lead to environmental degradation, public health hazards, and inefficient usage of resources. This research targets these challenges by designing an IWM framework like AI-IoT for smart waste management. The system employs AI models powered by IoT sensors for efficient waste collection, classification, and optimization of recycling schedules. CNN (convolutional neural networks) with transfer learning enabled by Res-Net provides high-accuracy image recognition, which can be used for waste classification. Bidirectional Encoder Representations from Transformers (BERT) allow multilingual users to interact and communicate properly in any linguistic environment. Data collected from IoT-enabled smart bins is transmitted in real-time to a central control system for dynamic decision-making and follow-up analysis. A pilot exercise to verify the system's effectiveness was implemented in metropolitan settings to show the transformation: landfill dependency was decreased by 30 %, recycling efficiency was greatly increased to 90 %, and thus the cost of waste management was optimized. At the same time, environmental health inequity, causing pathogen-related threats, was reduced by 35 %. The model has an accuracy of 96.8 %. The features of the proposed framework not only provide solutions to the existing inefficiencies but also enhance scalability, cost-effectiveness, and global environmental standardization. This dawns the futuristic growth of AI- and IoT-enabled waste management systems, which hinge on sustainability, public health, and resource efficienc
Micro-expressions (MEs) are fleeting involuntary facial movements, which occur frequently when people attempt to conceal their emotions. Since human eyesight cannot detect fleeting and slight changes in facial express...
详细信息
This paper surveys some of the most important recent works related to micro-expression analysis. It includes discussions on algorithms for spotting and recognizing micro-expressions, their performances, databases, and...
详细信息
For point cloud registration, the purpose of this article is to propose a novel centralized random sample consensus (RANSAC) (C-RANSAC) registration with fast convergence and high accuracy. In our algorithm, the novel...
详细信息
Due to the strong demand of massive storage capacity, the density of flash memory has been improved in terms of technology node scaling, multi-bit per cell technique, and 3D stacking. However, these techniques also de...
详细信息
The COVID-19 pandemic has already ravaged the world for two years and infected more than 600 million people, having an irreparable impact on the health, economic, and political dimensions of human society. There have ...
详细信息
A common cardiovascular illness with high fatality rates is coronary artery disease (CAD). Researchers have been exploring alternative methods to diagnose and assess the severity of CAD that are less invasive, cost-ef...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the cri...
详细信息
With the popularity of the Internet of Vehicles(IoV),a large amount of data is being generated every *** to securely share data between the IoV operator and various value-added service providers becomes one of the critical *** to its flexible and efficient fine-grained access control feature,Ciphertext-Policy Attribute-Based Encryption(CP-ABE)is suitable for data sharing in ***,there are many flaws in most existing CP-ABE schemes,such as attribute privacy leakage and key *** paper proposes a Traceable and Revocable CP-ABE-based Data Sharing with Partially hidden policy for IoV(TRE-DSP).A partially hidden access structure is adopted to hide sensitive user attribute values,and attribute categories are sent along with the ciphertext to effectively avoid privacy *** addition,key tracking and malicious user revocation are introduced with broadcast encryption to prevent key *** the main computation task is outsourced to the cloud,the burden of the user side is relatively *** of security and performance demonstrates that TRE-DSP is more secure and practical for data sharing in IoV.
暂无评论