Numbers of students with disabilities are growing recently around the whole Europe. Young people that are confronted with those special challenges are more and more interested in education at Higher Education Institut...
详细信息
Numbers of students with disabilities are growing recently around the whole Europe. Young people that are confronted with those special challenges are more and more interested in education at Higher Education Institutions, even more they are more and more interesting also in mobility what is a new motivation and challenge for them, their families and institutions. Different Higher Education Institutions have different support systems, different organizational rules and approaches to the teaching in the case of students with disabilities, but some common points (models) exists. Mostly all this rules have a background in the European and national legislation, but practical solutions (details) are different from the institution to the institution. In our paper we will present procedures from the University of Maribor - faculty of electrical engineering and computer science, as well as some available data.
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results...
详细信息
Spectrum sensing data falsification (SSDF) attack, i.e., Byzantine attack, is one of the critical threats of the cooperative spectrum sensing where the Byzantine attackers (BAs) forward incorrect local sensing results to mislead the fusion center on channel availability decisions. By using traditional voting rule, the cooperative spectrum sensing performance deteriorates significantly due to incorrect local sensing results. Then, reliability weight strategy becomes the popular solution to avoid incorrect sensing results from BAs and unreliable cognitive radio users (CRUs). However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Based on existing techniques, the BAs and CRUs may be assigned with low reliability weights or distinguished from the data fusion account. However, it is very difficult to detect the attackers since they also occasionally provide correct sensing results to the fusion center for concealing the attack objective. Then, existing techniques still suffer from BAs and negative impact of unreliable CRUs. In this paper, we propose the adaptive cooperative quality weight algorithm for mitigating the Byzantine attack issue by distinguishing the BAs and CRUs from the data fusion account while selecting only useful CRUs since the number of members in the account is also the important factor for cooperative spectrum sensing. In our proposed algorithm, we adopt a stable preference ordering towards ideal solution (SPOTIS) for determining the reliability of SUs which shows low computational complexity as compared to other reliability weight-based techniques. To achieve high sensing performance, our global decision threshold is adapted according to the reliability of reliable users. From the simulation results, our proposed algorithm significantly improves global detection probability and total error probability compared to the traditional votin
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease ...
详细信息
This paper explores the global spread of the COVID-19 virus since 2019, impacting 219 countries worldwide. Despite the absence of a definitive cure, the utilization of artificial intelligence (AI) methods for disease diagnosis has demonstrated commendable effectiveness in promptly diagnosing patients and curbing infection transmission. The study introduces a deep learning-based model tailored for COVID-19 detection, leveraging three prevalent medical imaging modalities: computed tomography (CT), chest X-ray (CXR), and Ultrasound. Various deep Transfer Learning Convolutional Neural Network-based (CNN) models have undergone assessment for each imaging modality. For each imaging modality, this study has selected the two most accurate models based on evaluation metrics such as accuracy and loss. Additionally, efforts have been made to prune unnecessary weights from these models to obtain more efficient and sparse models. By fusing these pruned models, enhanced performance has been achieved. The models have undergone rigorous training and testing using publicly available real-world medical datasets, focusing on classifying these datasets into three distinct categories: Normal, COVID-19 Pneumonia, and non-COVID-19 Pneumonia. The primary objective is to develop an optimized and swift model through strategies like Transfer Learning, Ensemble Learning, and reducing network complexity, making it easier for storage and transfer. The results of the trained network on test data exhibit promising outcomes. The accuracy of these models on the CT scan, X-ray, and ultrasound datasets stands at 99.4%, 98.9%, and 99.3%, respectively. Moreover, these models’ sizes have been substantially reduced and optimized by 51.93%, 38.00%, and 69.07%, respectively. This study proposes a computer-aided-coronavirus-detection system based on three standard medical imaging techniques. The intention is to assist radiologists in accurately and swiftly diagnosing the disease, especially during the screen
Recently, deep learning (DL)-based data-driven spectrum sensing has attracted much attention due to its powerful capabilities to exploit underlying signal features. Existing DL-based cooperative spectrum sensing (CSS)...
详细信息
Multi-label scene classification (MLSC) in remote sensing (RS) plays a crucial role in recognizing the intricate contents of RS images. However, the MLSC task is challenged by the complexity of label combinations and ...
详细信息
In maritime Internet of Things (IoT) systems, leveraging a swarm of Unmanned Aerial Vehicles (UAVs) and optical communication can achieve a variety of potential maritime missions. However, due to the high directionali...
详细信息
We present a geometric model of the differential sensitivity of the fidelity error for state transfer in a spintronic network based on the relationship between a set of matrix operators. We show an explicit dependence...
详细信息
Cyber-physical power systems are vulnerable to cyber-attacks, especially false data injection attacks (FDIAs). FDIAs against distribution system state estimation (DSSE), which alter state estimation (SE) by changing m...
详细信息
This paper examines a fluid antenna (FA)-assisted simultaneous wireless information and power transfer (SWIPT) system. Unlike traditional SWIPT systems with fixed-position antennas (FPAs), our FA-assisted system enabl...
详细信息
暂无评论