The increasing growth of Internet of Things (IoT) devices has created a wide attack surface for cyber criminals to carry out more destructive cyber attacks; therefore, the number of cyber attacks in the information se...
详细信息
ISBN:
(数字)9798350364828
ISBN:
(纸本)9798350364835
The increasing growth of Internet of Things (IoT) devices has created a wide attack surface for cyber criminals to carry out more destructive cyber attacks; therefore, the number of cyber attacks in the information security industry is increasing rapidly. As attackers use new and innovative methods to launch cyber-oriented attacks, many of these strikes have succeeded in their malicious goals. Anomaly-based intrusion detection systems (IDS) use machine learning techniques to detect and classify attacks on IoT networks. Faced with unpredictable network technologies and various infiltration methods, traditional machine learning technologies are powerless. In abounding areas of research, kernel learning methods prove that they accurately determine pathological abilities.
With the advancement and availability of the internet in the present age, everything is being wireless. Be it our home appliances or high defined monitoring systems, Wireless sensor networks play an important role. Bu...
详细信息
With the advancement and availability of the internet in the present age, everything is being wireless. Be it our home appliances or high defined monitoring systems, Wireless sensor networks play an important role. But with advancement comes a high probability of getting attacked. One of these attacks is the Blackhole attack (BHA), in which a node drains all the traffic towards itself and discards the data traffic without sending it towards the receiver. There exist multiple approaches that help to protect a network against BHA, but existing approaches have some drawbacks. Many proposed schemes make sure that the given technique uses less energy but failed to reduce the packet drop ratio. In the detection of BHA, the proposed scheme should not only detect defected nodes but also manages the efficiency. The proposed methodology used mobile agents with authentication of nodes and trust values to detect black hole nodes. The methodology is tested using different evaluation measures such as energy consumption, latency, network life, and packet delivery ratio. The proposed method uses a detection algorithm that increases energy consumption and hence networks lifetime. Packet delivery rate is increased by 19.51%, the energy consumption is reduced by 53.3%, and network life is increased by 43.3% as compared to the previous technique.
Although consortium blockchain has an identification mechanism, the captured internal clients are potentially threatening internal blockchain nodes. Internal Distributed Denial-of-Service (DDoS) attacks threaten the s...
详细信息
This study explores the feasibility of using large language models (LLMs), specifically GPT-4o (ChatGPT), for automated grading of conceptual questions in an undergraduate Mechanical engineering course. We compared th...
详细信息
We study the J1−J2 spin-1/2 chain using a path integral constructed over matrix product states (MPS). By virtue of its nontrivial entanglement structure, the MPS ansatz captures the key phases of the model even at a s...
详细信息
We study the J1−J2 spin-1/2 chain using a path integral constructed over matrix product states (MPS). By virtue of its nontrivial entanglement structure, the MPS ansatz captures the key phases of the model even at a semiclassical, saddle-point level, and, as a variational state, is in good agreement with the field theory obtained by Abelian bosonization. Going beyond the semiclassical level, we show that the MPS ansatz facilitates a physically motivated derivation of the field theory of the critical phase: By carefully taking the continuum limit—a generalization of the Haldane map—we recover from the MPS path integral a field theory with the correct topological term and emergent SO(4) symmetry, constructively linking the microscopic states and topological field-theoretic structures. Moreover, the dimerization transition is particularly clear in the MPS formulation—an explicit dimerization potential becomes relevant, gapping out the magnetic fluctuations.
Multiple kernel clustering is an unsupervised data analysis method that has been used in various scenarios where data is easy to be collected but hard to be ***,multiple kernel clustering for incomplete data is a crit...
详细信息
Multiple kernel clustering is an unsupervised data analysis method that has been used in various scenarios where data is easy to be collected but hard to be ***,multiple kernel clustering for incomplete data is a critical yet challenging *** the existing absent multiple kernel clustering methods have achieved remarkable performance on this task,they may fail when data has a high value-missing rate,and they may easily fall into a local *** address these problems,in this paper,we propose an absent multiple kernel clustering(AMKC)method on incomplete *** AMKC method rst clusters the initialized incomplete ***,it constructs a new multiple-kernel-based data space,referred to as K-space,from multiple sources to learn kernel combination ***,it seamlessly integrates an incomplete-kernel-imputation objective,a multiple-kernel-learning objective,and a kernel-clustering objective in order to achieve absent multiple kernel *** three stages in this process are carried out simultaneously until the convergence condition is *** on six datasets with various characteristics demonstrate that the kernel imputation and clustering performance of the proposed method is signicantly better than state-of-the-art ***,the proposed method gains fast convergence speed.
作者:
Bienstock, DanielDvorkin, YuryGuo, ChengMieth, RobertWang, JiayiColumbia University
Department of Industrial Engineering and Operations Research New YorkNY10027 United States Johns Hopkins University
Department of Electrical and Computer Engineering Department of Civil and System Engineering Ralph O'Connor Sustainable Energy Institute BaltimoreMD21218 United States Clemson University
School of Mathematical and Statistical Sciences ClemsonSC29634 United States Rutgers University
Department of Industrial and Systems Engineering New BrunswickNJ08901 United States Stanford University
Department of Management Science and Engineering StanfordCA94305 United States
We propose an enhancement to wholesale electricity markets to contain the exposure of consumers to increasingly large and volatile consumer payments arising as a byproduct of volatile real-time net loads - i.e., loads...
详细信息
Neural Radiance Fields (NeRF) achieve impressive rendering performance by learning volumetric 3D representation from several images of different views. However, it is difficult to reconstruct a sharp NeRF from blurry ...
详细信息
Most of existing studies on submodular maximization focus on selecting a subset of items that maximizes a single submodular function. However, in many real-world scenarios, we might have multiple user-specific functio...
Effectively reconstructing 3D hyperspectral images (HSIs) from 2D measurements presents a significant challenge in Coded Aperture Snapshot Spectral Imaging (CASSI) systems. While recent transformers exhibit potential ...
详细信息
ISBN:
(数字)9798350368741
ISBN:
(纸本)9798350368758
Effectively reconstructing 3D hyperspectral images (HSIs) from 2D measurements presents a significant challenge in Coded Aperture Snapshot Spectral Imaging (CASSI) systems. While recent transformers exhibit potential in HSI reconstruction, they often suffer from inadequate exploration of multi-scale spatial-spectral self-similarity, leading to mean effects and information loss. Additionally, these methods struggle with insufficient modeling of the degradation inherent in the compressive imaging process. To address these issues, we propose a novel Mask-guided Multi-scale Spatial-Spectral Transformer (MMSST). Specifically, we introduce a Degradation Aware Mask Attention (DAMA) module to incorporate degradation information of the compressive imaging process. Furthermore, MMSST leverages Local-Regional SpAtial attention (LRSA) and Global-Regional SpEctral attention (GRSE) to effectively exploit multi-scale self-similarity across spatial and spectral dimensions. Extensive experimental results demonstrate the effectiveness of our MMSST.
暂无评论