This research develops a new method to detect anomalies in time series data using Convolutional Neural Net-works (CNNs) in healthcare-IoT. The proposed method creates a Distributed Denial of Service (DDoS) attack usin...
详细信息
ISBN:
(数字)9798350383737
ISBN:
(纸本)9798350383744
This research develops a new method to detect anomalies in time series data using Convolutional Neural Net-works (CNNs) in healthcare-IoT. The proposed method creates a Distributed Denial of Service (DDoS) attack using an loT network simulator, Cooja, which emulates environmental sensors such as temperature and humidity. CNNs detect anomalies in time series data, resulting in a 92 % accuracy in identifying possible attacks.
The paper introduces the Cultural Leaf Semantic Portal whose aim is to provide a consolidated user-friendly solution for exploring the 36,132 Romanian artifacts and the 1,086 cultural entities that house them. Using t...
详细信息
Brain tumors are sudden outbreak of cells in the brain or on its surface and are categorized into gliomas, meningiomas, and pituitary adenomas. Traditionally, tumors of the brain are categorized using a manual approac...
详细信息
In recent years, with the rapid development of the digital currency market, the security issues of digital currency transactions have become increasingly prominent, and abnormal transaction detection has become an imp...
详细信息
ISBN:
(数字)9798331527624
ISBN:
(纸本)9798331527631
In recent years, with the rapid development of the digital currency market, the security issues of digital currency transactions have become increasingly prominent, and abnormal transaction detection has become an important technical means to ensure the security of the financial system. Traditional detection methods face many challenges in dealing with complex blockchain data, as they cannot fully utilize the inherent structural information of transaction data, and are difficult to handle the problem of imbalanced categories. Accordingly, this study proposes a GNN (Graph Neural Network)-based abnormal transaction detection method, which models transaction data as a graph structure, extracts transaction features using Graph Convolutional Network (GCN) and uses small sample processing techniques to alleviate data imbalance. The proposed method showed that the experimental results could effectively improve the detection performance of abnormal transactions after multiple rounds of training, especially in terms of AUC evaluation indicators, which verifies its potential application in the detection of abnormal transactions in digital currencies. This study provides a novel and effective solution for anomaly detection in complex network data and points out the direction for future research.
Recently, the research emphasis has shifted towards 5G due to its potential to accommodate the increasing demand for data traffic, extensive interconnectivity of devices, and the emergence of numerous novel applicatio...
详细信息
Large-data set artificial neural network training takes a lot of time. Many ways for reducing effort have been proposed, many of which make use of parallelization techniques. This paper explores the implementation of ...
Large-data set artificial neural network training takes a lot of time. Many ways for reducing effort have been proposed, many of which make use of parallelization techniques. This paper explores the implementation of face detection algorithms utilizing OPENMP to achieve greater efficiency through parallelization. We focus on specific OpenMP parallelization setups that run on a typical multi-threaded CPU. These frameworks are also available for CUDA, however utilizing CUDA is only possible if you have an NVIDIA graphics card, which is clearly not the case for everyone. OpenMP's release of a stable version in late 2015 facilitated parallel processing and broadened its development base.
The Electronic Control Unit (ECU) is an integral part of a vehicle from which we can extract data which makes perfect sense regarding multiple aspects in the automotive sector. This is critical information for analysi...
详细信息
ISBN:
(数字)9798331528140
ISBN:
(纸本)9798331528157
The Electronic Control Unit (ECU) is an integral part of a vehicle from which we can extract data which makes perfect sense regarding multiple aspects in the automotive sector. This is critical information for analysing driving behaviour. These capabilities are put together to work in the project, utilizing machine learning models to classify drivers based on their fuel efficiency and predict fuel consumption. The feature selection process enables to pinpoint the most noteworthy factors and utilize them to construct accurate fuel usage regression models. The proposed system implements algorithms like Random Forest Regression, AdaBoost Regression for prediction and K-Means Clustering for classification. With an in-dept. review of driving profiles such as Sporty, Eco, Calm, Normal and Aggressive this project enables a broader comprehension of your complete drives and furthermore enabling a smarter fuel-efficient drive, which is noteworthy way for better vehicle execution and lower natural impact.
An efficient technique for preserving user privacy of users while publishing data is anonymization. Banks, Social Network service providers and hospitals are examples of data owners/stakeholders who anonymize their cu...
An efficient technique for preserving user privacy of users while publishing data is anonymization. Banks, Social Network service providers and hospitals are examples of data owners/stakeholders who anonymize their customers' data before releasing it in order to protect users' privacy. However, trustworthy information consumers still value anonymous data. Numerous anonymization models and techniques have been developed for releasing data while preserving user privacy. These models/algorithms de-identify user data, which is typically presented as graphs. Giving clear perspectives on the entire information privacy field, including recent anonymization research, tabular and SN data, is crucial. In this article, we proposed an approach for anonymization to address privacy issues in social networks specifically addressing semantic similarity attacks. Far as we are aware, our proposed technique is capable of resolving the issues of semantic similarity between sensitive attributes efficiently. The results of the proposed approach have been evaluated using the dataset of around 6000 users of a real-time social network viz. Twitter. Evaluation metrics of APL (Average Path Length) show that our technique can protect privacy and also maintain the utility of data while publishing it for public use.
The Domain Name System (DNS) is the most important building block of the Internet. Websites, file transfer applications, and e-mail services use the DNS service. Therefore, these services can rarely be blocked by fire...
详细信息
ISBN:
(数字)9798350330366
ISBN:
(纸本)9798350330373
The Domain Name System (DNS) is the most important building block of the Internet. Websites, file transfer applications, and e-mail services use the DNS service. Therefore, these services can rarely be blocked by firewalls to prevent their access from being affected. Since applications such as firewalls and Intrusion Detection Systems (IDS) do not check the allowed protocols, attackers can open a secret path called DNS Tunnel through the DNS protocol to access sensitive data and cause many attacks. In this study, DNS Tunnel, DNS Tunnel detection methods and detection methods, and DNS attack types are included.
Group imbalance has been a known problem in empirical risk minimization (ERM), where the achieved high average accuracy is accompanied by low accuracy in a minority group. Despite algorithmic efforts to improve the mi...
详细信息
暂无评论