As internet use in communication networks has grown, fake news has become a big problem. The misleading heading of the news loses the trust of the reader. Many techniques have emerged, but they fail because fraudsters...
详细信息
With the recent advancements of deep learning-based methods in image classification,the requirement of a huge amount of training data is inevitable to avoid overfitting ***,supervised deep learning models require labe...
详细信息
With the recent advancements of deep learning-based methods in image classification,the requirement of a huge amount of training data is inevitable to avoid overfitting ***,supervised deep learning models require labelled datasets for *** such a huge amount of labelled data requires considerable human effort and *** this scenario,self-supervised models are becoming popular because of their ability to learn even from unlabelled ***,the efficient transfer of knowledge learned by self-supervised models into a target task,is an unsolved *** paper proposes a method for the efficient transfer of know-ledge learned by a self-supervised model,into a target *** such as the number of layers,the number of units in each layer,learning rate,and dropout are automatically tuned in these fully connected(FC)layers using a Bayesian optimization technique called the tree-structured parzen estimator(TPE)approach *** evaluate the performance of the proposed method,state-of-the-art self-supervised models such as SimClr and SWAV are used to extract the learned *** are carried out on the CIFAR-10,CIFAR-100,and Tiny ImageNet *** proposed method outperforms the baseline approach with margins of 2.97%,2.45%,and 0.91%for the CIFAR-100,Tiny ImageNet,and CIFAR-10 datasets,respectively.
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for att...
详细信息
The increase in number of people using the Internet leads to increased cyberattack *** Persistent Threats,or APTs,are among the most dangerous targeted *** attacks utilize various advanced tools and techniques for attacking targets with specific *** countries with advanced technologies,like the US,Russia,the UK,and India,are susceptible to this targeted *** is a sophisticated attack that involves multiple stages and specific ***,TTP(Tools,Techniques,and Procedures)involved in the APT attack are commonly new and developed by an attacker to evade the security ***,APTs are generally implemented in multiple *** one of the stages is detected,we may apply a defense mechanism for subsequent stages,leading to the entire APT attack *** detection at the early stage of APT and the prediction of the next step in the APT kill chain are ongoing *** survey paper will provide knowledge about APT attacks and their essential *** follows the case study of known APT attacks,which will give clear information about the APT attack process—in later sections,highlighting the various detection methods defined by different researchers along with the limitations of the *** used in this article comes from the various annual reports published by security experts and blogs and information released by the enterprise networks targeted by the attack.
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights o...
详细信息
We present a novel attention-based mechanism to learn enhanced point features for point cloud processing tasks, e.g., classification and segmentation. Unlike prior studies, which were trained to optimize the weights of a pre-selected set of attention points, our approach learns to locate the best attention points to maximize the performance of a specific task, e.g., point cloud classification. Importantly, we advocate the use of single attention point to facilitate semantic understanding in point feature learning. Specifically,we formulate a new and simple convolution, which combines convolutional features from an input point and its corresponding learned attention point(LAP). Our attention mechanism can be easily incorporated into state-of-the-art point cloud classification and segmentation networks. Extensive experiments on common benchmarks, such as Model Net40, Shape Net Part, and S3DIS, all demonstrate that our LAP-enabled networks consistently outperform the respective original networks, as well as other competitive alternatives, which employ multiple attention points, either pre-selected or learned under our LAP framework.
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
Mobile Ad hoc Network (MANET) is broadly applicable in various sectors within a short amount of time, which is connected to mobile developments. However, the communication in the MANET faces several issues like synchr...
详细信息
In real-world materials research,machine learning(ML)models are usually expected to predict and discover novel exceptional materials that deviate from the known *** is thus a pressing question to provide an objective ...
详细信息
In real-world materials research,machine learning(ML)models are usually expected to predict and discover novel exceptional materials that deviate from the known *** is thus a pressing question to provide an objective evaluation ofMLmodel performances in property prediction of out-ofdistribution(OOD)materials that are different fromthe training *** performance evaluation of materials property prediction models through the random splitting of the dataset frequently results in artificially high-performance assessments due to the inherent redundancy of typical material datasets.
The development of public transportation is considered a vital issue in reducing traffic as well as urban pollution. City buses play an important role in the city transportation system. In Iran, due to the high averag...
详细信息
In vehicular ad-hoc networks (VANETs), ensuring passenger safety requires fast and reliable emergency message broadcasts. The current communication standard for messaging in VANETs is IEEE 802.11p. As IEEE 802.11p all...
详细信息
In vehicular ad-hoc networks (VANETs), ensuring passenger safety requires fast and reliable emergency message broadcasts. The current communication standard for messaging in VANETs is IEEE 802.11p. As IEEE 802.11p allows carrier-sense multiple access with collision avoidance (CSMA/CA) in the media access control (MAC) layer. A large contention window ($CW$) value will increase delay, whereas a small $CW$ value will increase the probability of collision. Therefore, adaptive regulation of the $CW$ value is needed to achieve high reliability and low delay in VANETs, in accordance with variations in the environment. However, the traditional MAC protocol cannot achieve the aforementioned requirements. Reinforcement learning (RL) emphasizes the selection of optimal action according to observations of the environment to achieve optimal system performance. In this study, a Q-learning (QL) RL algorithm based on IEEE 802.11p was used to achieve the requirements of adaptive broadcasting. Adaptive broadcasting was achieved based on a reward definition of high reliability and low delay for the QL algorithm. In this approach, the learning state is the $CW$ size, the system sets up a Q-table using RL, and the optimal action is based on the maximum Q-value. The $CW$ size can be provided with adaptive self-regulation by RL, providing high reliability and low delay for the broadcast of emergency messages. We also compared our proposed scheme to other QL-based MAC protocols in VANETs by performing simulations and demonstrated that it can achieve high reliability and low delay for the broadcast of emergency messages. IEEE
Artificial intelligence (AI) has the potential to revolutionize the field of gastrointestinal disease diagnosis by enabling the development of accurate and efficient automated systems. This study comprehensively inves...
详细信息
暂无评论