Artificial Intelligence (AI) has made huge enhancements in colon cancer research through its methods for diagnosis, treatment, and custom detection of one of the most common and fatal cancers suffered globally. Throug...
详细信息
Face recognition technology has dramatically transformed the landscape of security, surveillance, and authentication systems, offering a user-friendly and non-invasive biometric solution. However, despite its signific...
Post-quantum (PQ) cryptographic algorithms are currently being developed to be able to resist attacks by quantum computers. The practical use of these algorithms for securing networks will depend on their computationa...
详细信息
Post-quantum (PQ) cryptographic algorithms are currently being developed to be able to resist attacks by quantum computers. The practical use of these algorithms for securing networks will depend on their computational and communication efficiency. In particular, this is critical for the security of wireless communications within the context of consumer IoT devices that may have limited computational power and depend on a constrained wireless bandwidth. To this end, there is a need to evaluate the performance of widely used application layer security standards such as transport layer security (TLS) to understand the use of the existing PQ algorithms that are being evaluated by NIST as a replacement to the current cryptographic algorithms. This paper focuses on two widely used IoT standards Bluetooth Low Energy (BLE) and WiFi to find out the optimal performing PQ algorithm for their security when used in end-to-end connections over the Internet. By implementing the capability for IP over BLE and all options of TLS connection establishment, we developed a client-server IoT testbed to measure the efficiency of PQ key encapsulation mechanisms (KEMs) and PQ digital signature algorithms. The test results showed that Kyber512 is the ideal KEM while Falcon-512 and Dilithium2 are the best signatures for BLE and WiFi devices. Based on this outcome, we developed a mechanism for IoT devices with multiple communication interfaces, that dynamically chooses a PQ KEM algorithm based on the MAC layer protocol being used at the time.
Semantic communication (SemCom) has emerged as a pivotal advancement in communication systems by focusing on the transmission of task-relevant meaning rather than raw data. This paradigm shift enables efficient commun...
详细信息
ISBN:
(数字)9798331507022
ISBN:
(纸本)9798331507039
Semantic communication (SemCom) has emerged as a pivotal advancement in communication systems by focusing on the transmission of task-relevant meaning rather than raw data. This paradigm shift enables efficient communication for intelligent systems but also introduces new security and privacy risks. This paper explores these risks, reviews state-of-the-art countermeasures, and identifies key challenges and future directions in ensuring secure and private semantic communication. By addressing these issues, SemCom can fulfill its potential in domains such as healthcare, IoT, and autonomous systems.
IoMT is emerging as a key technology that enables efficient physician diagnosis, such as real-time patient monitoring and data collection in modern healthcare. IoMT is used through IoMT devices such as IMD, IoWDs, and...
详细信息
ISBN:
(数字)9798331504120
ISBN:
(纸本)9798331504137
IoMT is emerging as a key technology that enables efficient physician diagnosis, such as real-time patient monitoring and data collection in modern healthcare. IoMT is used through IoMT devices such as IMD, IoWDs, and APS. IoMT offers benefits such as improved patient care and optimization of medical processes. However, these advancements are accompanied by security vulnerabilities. Therefore, security requirements and security frameworks are required. In this paper, we examine the major security requirements of IoMT, such as patient privacy protection, data encryption, and integrity of medical information. In addition, we analyze unique characteristics and specific threats in the IoMT environment and present security issues. To solve these issues, this paper comprehensively analyzes encryption strategies, authentication protocols, blockchain, AI, and ML proposed in the latest research. This paper is expected to be the cornerstone of the design and verification of essential security elements in IoMT and will make an important contribution to future IoMT security research.
The abstract delves into the groundbreaking realm of DeepFakes, a revolutionary synthesis of deep learning and synthetic media. Central to DeepFake generation is the utilization of Generative Adversarial Networks (GAN...
The abstract delves into the groundbreaking realm of DeepFakes, a revolutionary synthesis of deep learning and synthetic media. Central to DeepFake generation is the utilization of Generative Adversarial Networks (GANs), particularly the innovative mechanisms of face reenactment involving DCGANs (Deep Convolutional GANs) and Autoencoders. These technologies empower a generator to transform random noise into hyper-realistic visuals, capturing intricate details such as facial expressions and lighting conditions through latent space interpolation. The adversarial interplay between generator and discriminator continuously refines the authenticity of the generated content. While DeepFakes unlocks creative possibilities for artists and filmmakers, the abstract underscores the ethical concerns surrounding misinformation, privacy breaches, and trust erosion in digital media. The discourse navigates the delicate balance between creative freedom and responsible use, highlighting how DeepFakes, with their roots in advanced deep learning techniques, redefine our perception of synthetic media, challenging notions of reality in our increasingly digital world.
With the increasing speed of advance of both Internet of Things (IoT) and the demands of utilizing IoT devices in different locations with high compatibility, fog computing has been foreseen as a sustainable solution....
With the increasing speed of advance of both Internet of Things (IoT) and the demands of utilizing IoT devices in different locations with high compatibility, fog computing has been foreseen as a sustainable solution. However, new challenges related to fog computing's cyber security also emerge. Among various cyber-attacks on the fog computing system, one standard method is to implement corrupted internal nodes that allow malicious/compromised access from attackers, threatening the confidentiality of users' information and the system's performance. In this paper, we propose a method to quantify the distribution of each attribute value from historical access logs from each node within a fog computing system. We also utilize an unsupervised machine learning method to separate nodes into smaller clusters with respect to different models to improve the forecasting ability of the system. Finally, our models are evaluated over simulated data using real access logs. Our experimental results illustrate that our proposed method achieves some advanced performance over applying an overall classification, even using the same classification machine learning methods and dataset.
These days, colon cancer is a frightening global problem that kills many people. Particularly in countries in South Asia, it is growing daily. Because early discovery can significantly affect the cancer’s survival. A...
详细信息
ISBN:
(数字)9798331531782
ISBN:
(纸本)9798331507923
These days, colon cancer is a frightening global problem that kills many people. Particularly in countries in South Asia, it is growing daily. Because early discovery can significantly affect the cancer’s survival. An AI and machine learning integration technique must be developed to do this. Our main goal is to use cutting-edge machine-learning algorithms to detect colon cancer. 6000 raw pictures of colon cancer in four classes—Normal, U1cerative_Colits, Polyps, and Esophagitis— were used in this study. After applying image pre-processing techniques to improve the data quality, we implemented three advanced deep-learning techniques using our Customized model. Our customized model (InceptionResNetV2 + customized layers) provides the maximum accuracy of 95.88%, whereas VGG19, Inception v3, and ResNet50 provide healthy accuracy. We have performed a comparative analysis with related work by those who work with the same dataset, and our model outperformed all of them. Our suggested model, preprocessing strategies, and data verification approach demonstrate an influential body of work in the medical field. Due to its advanced AI and ML-based research, this could have a significant impact on the computerized medical sector.
As the prevalence of Internet of Things (IoT) products keeps increase, the need for robust security measures becomes increasingly vital. Our paper addresses this concern by conducting a detailed comparative analysis o...
详细信息
ISBN:
(数字)9798350375237
ISBN:
(纸本)9798350375244
As the prevalence of Internet of Things (IoT) products keeps increase, the need for robust security measures becomes increasingly vital. Our paper addresses this concern by conducting a detailed comparative analysis of various machine learning methods, assessing their effectiveness in detecting and predicting malicious activities associated with IoT botnets. This paper meticulously examines initial identification methods for IoT botnet operations using advanced machine learning (ML) prediction techniques. To achieve this, we utilize the CICIoT2023 Dataset, a real-world IoT dataset obtained from networks that captures diverse device interactions and communication patterns. This dataset acts as the framework for constructing and evaluating numerous machine learning techniques, including support vector machines (SVM), k-nearest neighbours (k-NN), Naive Bayes, random forest (RF), logistic regression (LR), and decision trees (DT) approaches. Performance metrics such as accuracy, precision, F1-score, ROC curve, confusion matrix, and recall are employed to gain insights into the algorithms’ capabilities in botnet detection. Furthermore, this paper delves into an examination of the trade-offs between computational complexity and detection accuracy. This analysis aids in selecting the most suitable ML techniques tailored to specific IoT security scenarios. This comparative analysis lays the groundwork for the advancement of IoT botnet discovery strategies, providing essential insights to researchers, practitioners, and industry experts working to strengthen IoT ecosystems against growing cyber threats. We anticipate that our findings will spark more conversations and developments in the sector, promoting the establishment of more robust and adaptable security measures across the IoT landscape.
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-...
详细信息
ISBN:
(数字)9798350365337
ISBN:
(纸本)9798350365344
Accurate traffic sign recognition is crucial for autonomous vehicles. This paper proposes a novel deep learning approach for sign classification that addresses limitations in training data. Our method employs a three-step process: strategic data augmentation with rotation limitations for realistic variations, feature extraction using parallel atrous convolution layers with varying dilation rates to capture multi-scale information, and robust feature map generation through output concatenation. This approach achieves a remarkable accuracy of 94.65%, surpassing the performance of established pre-trained models like VGG-16, ResNet-50, and AlexNet. This research contributes a significant advancement in real-world traffic sign classification in autonomous vehicles.
暂无评论