With advancement of technology, the technique of selective scalable secret image sharing (SSSIS) was first proposed in 2017 as a new alternative of secret image sharing. The region of interest (ROI) in the protected s...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data commu...
详细信息
information security has emerged as a crucial consideration over the past decade due to escalating cyber security threats,with Internet of Things(IoT)security gaining particular attention due to its role in data communication across various ***,IoT devices,typically low-powered,are susceptible to cyber ***,blockchain has emerged as a robust solution to secure these devices due to its decentralised ***,the fusion of blockchain and IoT technologies is challenging due to performance bottlenecks,network scalability limitations,and blockchain-specific security ***,on the other hand,is a recently emerged information security solution that has great potential to secure low-powered IoT *** study aims to identify blockchain-specific vulnerabilities through changes in network behaviour,addressing a significant research gap and aiming to mitigate future cybersecurity *** blockchain and IoT technologies presents challenges,including performance bottlenecks,network scalability issues,and unique security *** paper analyses potential security weaknesses in blockchain and their impact on network *** developed a real IoT test system utilising three prevalent blockchain applications to conduct *** results indicate that Distributed Denial of Service(DDoS)attacks on low-powered,blockchain-enabled IoT sensor networks cause measurable anomalies in network and device performance,specifically:(1)an average increase in CPU core usage to 34.32%,(2)a reduction in hash rates by up to 66%,(3)an increase in batch timeout by up to 14.28%,and(4)an increase in block latency by up to 11.1%.These findings suggest potential strategies to counter future DDoS attacks on IoT networks.
In the rapidly evolving landscape of cyber threats, phishing continues to be a prominent vector for cyberattacks, posing significant risks to individuals, organizations and information systems. This letter delves into...
详细信息
The recent advancements in deep convolutional neural networks have shown significant promise in the domain of road scene parsing. Nevertheless, the existing works focus primarily on freespace detection, with little at...
详细信息
The recent advancements in deep convolutional neural networks have shown significant promise in the domain of road scene parsing. Nevertheless, the existing works focus primarily on freespace detection, with little attention given to hazardous road defects that could compromise both driving safety and comfort. In this article, we introduce RoadFormer, a novel Transformer-based data-fusion network developed for road scene parsing. RoadFormer utilizes a duplex encoder architecture to extract heterogeneous features from both RGB images and surface normal information. The encoded features are subsequently fed into a novel heterogeneous feature synergy block for effective feature fusion and recalibration. The pixel decoder then learns multi-scale long-range dependencies from the fused and recalibrated heterogeneous features, which are subsequently processed by a Transformer decoder to produce the final semantic prediction. Additionally, we release SYN-UDTIRI, the first large-scale road scene parsing dataset that contains over 10,407 RGB images, dense depth images, and the corresponding pixel-level annotations for both freespace and road defects of different shapes and sizes. Extensive experimental evaluations conducted on our SYN-UDTIRI dataset, as well as on three public datasets, including KITTI road, CityScapes, and ORFD, demonstrate that RoadFormer outperforms all other state-of-the-art networks for road scene parsing. Specifically, RoadFormer ranks first on the KITTI road benchmark. Our source code, created dataset, and demo video are publicly available at ***/RoadFormer. IEEE
A lot of research shows that there could be several reasons why the duality of agricultural products has been reduced. Plant diseases make up one of the most important components of this quality. Therefore, the reduct...
详细信息
In recent years,with the development of blockchain,electronic bidding auction has received more and more *** at the possible problems of privacy leakage in the current electronic bidding and auction,this paper propose...
详细信息
In recent years,with the development of blockchain,electronic bidding auction has received more and more *** at the possible problems of privacy leakage in the current electronic bidding and auction,this paper proposes an electronic bidding auction system based on blockchain against malicious adversaries,which uses the secure multi-party computation to realize secure bidding auction protocol without any trusted third *** protocol proposed in this paper is an electronic bidding auction scheme based on the threshold elliptic curve *** can be implemented without any third party to complete the bidding auction for some malicious behaviors of the participants,which can solve the problem of resisting malicious adversary *** security of the protocol is proved by the real/ideal model paradigm,and the efficiency of the protocol is *** efficiency of the protocol is verified by simulating experiments,and the protocol has practical value.
Diabetic foot ulcer (DFU) is a potentially fatal complication of diabetes. Traditional techniques of DFU analysis and therapy are more time-consuming and costly. Artificial intelligence (AI), particularly deep neural ...
详细信息
Road traffic monitoring is an imperative topic widely discussed among *** used to monitor traffic frequently rely on cameras mounted on bridges or ***,aerial images provide the flexibility to use mobile platforms to d...
详细信息
Road traffic monitoring is an imperative topic widely discussed among *** used to monitor traffic frequently rely on cameras mounted on bridges or ***,aerial images provide the flexibility to use mobile platforms to detect the location and motion of the vehicle over a larger *** this end,different models have shown the ability to recognize and track ***,these methods are not mature enough to produce accurate results in complex road ***,this paper presents an algorithm that combines state-of-the-art techniques for identifying and tracking vehicles in conjunction with image *** extracted frames were converted to grayscale,followed by the application of a georeferencing algorithm to embed coordinate information into the *** masking technique eliminated irrelevant data and reduced the computational cost of the overall monitoring ***,Sobel edge detection combined with Canny edge detection and Hough line transform has been applied for noise *** preprocessing,the blob detection algorithm helped detect the *** of varying sizes have been detected by implementing a dynamic thresholding *** was done on the first image of every ***,to track vehicles,the model of each vehicle was made to find its matches in the succeeding images using the template matching *** further improve the tracking accuracy by incorporating motion information,Scale Invariant Feature Transform(SIFT)features have been used to find the best possible match among multiple *** accuracy rate of 87%for detection and 80%accuracy for tracking in the A1 Motorway Netherland dataset has been *** the Vehicle Aerial Imaging from Drone(VAID)dataset,an accuracy rate of 86%for detection and 78%accuracy for tracking has been achieved.
In the era of rapid technological advancement, the Internet of Things (IoT) has revolutionised healthcare through systems like the Telecare Medicine information System (TMIS), designed to streamline patient-doctor int...
详细信息
In the digital age, social media platforms like Twitter have become a central forum for public discourse, reflecting diverse opinions on various topics. This paper explores the application of sentiment analysis to Twi...
详细信息
暂无评论