The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** ...
详细信息
The advancements in technology have substantially grown the size of image *** image encryption algorithms have limited capabilities to deal with the emerging challenges in big data,including compression and noise *** image encryption method that is based on chaotic maps and orthogonal matrix is proposed in this *** proposed scheme is built on the intriguing characteristics of an orthogonal *** Schmidt disperses the values of pixels in a plaintext image by generating a random orthogonal matrix using logistic chaotic *** the diffusion process,a block-wise random permutation of the data is performed using *** proposed scheme provides sufficient security and resilience to JPEG compression and channel noise through a series of experiments and security *** enables Partial Encryption(PE)for faster processing as well as complete encryption for increased *** higher values of the number of pixels change rates and unified average change intensity confirm the security of the encryption *** contrast to other schemes,the proposed approach can perform full and partial encryption depending on security requirements.
Even though various features have been investigated in the detection of figurative language, oxymoron features have not been considered in the classification of sarcastic content. The main objective of this work is to...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,...
详细信息
With the exponential rise in global air traffic,ensuring swift passenger processing while countering potential security threats has become a paramount concern for aviation *** X-ray baggage monitoring is now standard,manual screening has several limitations,including the propensity for errors,and raises concerns about passenger *** address these drawbacks,researchers have leveraged recent advances in deep learning to design threatsegmentation ***,these models require extensive training data and labour-intensive dense pixelwise annotations and are finetuned separately for each dataset to account for inter-dataset ***,this study proposes a semi-supervised contour-driven broad learning system(BLS)for X-ray baggage security threat instance segmentation referred to as *** research methodology involved enhancing representation learning and achieving faster training capability to tackle severe occlusion and class imbalance using a single training routine with limited baggage *** proposed framework was trained with minimal supervision using resource-efficient image-level labels to localize illegal items in multi-vendor baggage *** specifically,the framework generated candidate region segments from the input X-ray scans based on local intensity transition cues,effectively identifying concealed prohibited items without entire baggage *** multi-convolutional BLS exploits the rich complementary features extracted from these region segments to predict object categories,including threat and benign *** contours corresponding to the region segments predicted as threats were then utilized to yield the segmentation *** proposed C-BLX system was thoroughly evaluated on three highly imbalanced public datasets and surpassed other competitive approaches in baggage-threat segmentation,yielding 90.04%,78.92%,and 59.44%in terms of mIoU on GDXray,SIXray,and Compass-XP,***,the lim
Image retargeting aims to alter the size of the image with attention to the contents. One of the main obstacles to training deep learning models for image retargeting is the need for a vast labeled dataset. Labeled da...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are v...
详细信息
Mobile devices within Fifth Generation(5G)networks,typically equipped with Android systems,serve as a bridge to connect digital gadgets such as global positioning system,mobile devices,and wireless routers,which are vital in facilitating end-user communication ***,the security of Android systems has been challenged by the sensitive data involved,leading to vulnerabilities in mobile devices used in 5G *** vulnerabilities expose mobile devices to cyber-attacks,primarily resulting from security ***-permission apps in Android can exploit these channels to access sensitive information,including user identities,login credentials,and geolocation *** such attack leverages"zero-permission"sensors like accelerometers and gyroscopes,enabling attackers to gather information about the smartphone's *** underscores the importance of fortifying mobile devices against potential future *** research focuses on a new recurrent neural network prediction model,which has proved highly effective for detecting side-channel attacks in mobile devices in 5G *** conducted state-of-the-art comparative studies to validate our experimental *** results demonstrate that even a small amount of training data can accurately recognize 37.5%of previously unseen user-typed ***,our tap detection mechanism achieves a 92%accuracy rate,a crucial factor for text *** findings have significant practical implications,as they reinforce mobile device security in 5G networks,enhancing user privacy,and data protection.
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in convention...
详细信息
Detecting sophisticated cyberattacks,mainly Distributed Denial of Service(DDoS)attacks,with unexpected patterns remains challenging in modern *** detection systems often struggle to mitigate such attacks in conventional and software-defined networking(SDN)*** Machine Learning(ML)models can distinguish between benign and malicious traffic,their limited feature scope hinders the detection of new zero-day or low-rate DDoS attacks requiring frequent *** this paper,we propose a novel DDoS detection framework that combines Machine Learning(ML)and Ensemble Learning(EL)techniques to improve DDoS attack detection and mitigation in SDN *** model leverages the“DDoS SDN”dataset for training and evaluation and employs a dynamic feature selection mechanism that enhances detection accuracy by focusing on the most relevant *** adaptive approach addresses the limitations of conventional ML models and provides more accurate detection of various DDoS attack *** proposed ensemble model introduces an additional layer of detection,increasing reliability through the innovative application of ensemble *** proposed solution significantly enhances the model’s ability to identify and respond to dynamic threats in *** provides a strong foundation for proactive DDoS detection and mitigation,enhancing network defenses against evolving *** comprehensive runtime analysis of Simultaneous Multi-Threading(SMT)on identical configurations shows superior accuracy and efficiency,with significantly reduced computational time,making it ideal for real-time DDoS detection in dynamic,rapidly changing *** results demonstrate that our model achieves outstanding performance,outperforming traditional algorithms with 99%accuracy using Random Forest(RF)and K-Nearest Neighbors(KNN)and 98%accuracy using XGBoost.
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation ...
详细信息
IOUT (Internet of Underwater Things) relies on underwater acoustic sensors, which have limited resources such as battery power and bandwidth. The exchange of data among these sensors faces challenges like propagation delay, node displacement, and environmental errors, making network maintenance difficult. The objective of this study is to address the energy efficiency and performance issues in IOUT networks by proposing and evaluating an energy-efficient routing protocol called Efficient Cost Wakeup Routing Protocol (ECWRP). To achieve the objective, the study focuses on two key parameters: Cost and Duty Cycle. The Duty Cycle parameter helps in reducing undesirable impacts during underwater communications, improving the performance of the routing protocol. The Cost parameter is utilized to select the most efficient path for data transmission, considering factors such as transmitting power levels. The protocol is applied to a multi-hop mesh-based network. The proposed ECWRP routing protocol is assessed through simulations, demonstrating its superior efficiency compared to the Ride algorithm. By eliminating unnecessary handshaking and optimizing route selection, ECWRP significantly enhances energy efficiency and overall performance within the IoUT network. The study's findings on the enhanced energy efficiency and performance improvements achieved by the ECWRP protocol hold promising implications for the design and optimization of IoUT networks, paving the way for more sustainable and effective communication systems in underwater environments. In conclusion, the study demonstrates the effectiveness of the Efficient Cost Wakeup Routing Protocol (ECWRP) in enhancing energy efficiency and performance in multi-hop mesh-based IoUT networks. The protocol's utilization of the Duty Cycle parameter reduces undesirable impacts, while the Cost parameter enables the selection of the most efficient path for data transmission. The results confirm the superiority of the ECWRP protoc
Graph alignment refers to the task of finding the vertex correspondence between two correlated graphs of n vertices. Extensive study has been done on polynomial time algorithms for the graph alignment problem under th...
详细信息
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these atta...
详细信息
False Data Injection Attacks (FDIA) pose a significant threat to the stability of smart grids. Traditional Bad Data Detection (BDD) algorithms, deployed to remove low-quality data, can easily be bypassed by these attacks which require minimal knowledge about the parameters of the power bus systems. This makes it essential to develop defence approaches that are generic and scalable to all types of power systems. Deep learning algorithms provide state-of-the-art detection for FDIA while requiring no knowledge about system parameters. However, there are very few works in the literature that evaluate these models for FDIA detection at the level of an individual node in the power system. In this paper, we compare several recent deep learning-based model that proven their high performance and accuracy in detecting the exact location of the attack node, which are convolutional neural networks (CNN), Long Short-Term Memory (LSTM), attention-based bidirectional LSTM, and hybrid models. We, then, compare their performance with baseline multi-layer perceptron (MLP)., All the models are evaluated on IEEE-14 and IEEE-118 bus systems in terms of row accuracy (RACC), computational time, and memory space required for training the deep learning model. Each model was further investigated through a manual grid search to determine the optimal architecture of the deep learning model, including the number of layers and neurons in each layer. Based on the results, CNN model exhibited consistently high performance in very short training time. LSTM achieved the second highest accuracy;however, it had required an averagely higher training time. The attention-based LSTM model achieved a high accuracy of 94.53 during hyperparameter tuning, while the CNN model achieved a moderately lower accuracy with only one-fourth of the training time. Finally, the performance of each model was quantified on different variants of the dataset—which varied in their l2-norm. Based on the results, LSTM, CNN obta
By integrating smart grid technology with home energy management systems, households can monitor and optimise their energy consumption. This allows for more efficient use of energy resources, reducing waste and loweri...
详细信息
暂无评论