Face verification systems are critical in a wide range of applications,such as security systems and biometric ***,these systems are vulnerable to adversarial attacks,which can significantly compromise their accuracy a...
详细信息
Face verification systems are critical in a wide range of applications,such as security systems and biometric ***,these systems are vulnerable to adversarial attacks,which can significantly compromise their accuracy and *** attacks are designed to deceive the face verification system by adding subtle perturbations to the input *** perturbations can be imperceptible to the human eye but can cause the systemtomisclassifyor fail torecognize thepersoninthe *** this issue,weproposeanovel system called VeriFace that comprises two defense mechanisms,adversarial detection,and adversarial *** first mechanism,adversarial detection,is designed to identify whether an input image has been subjected to adversarial *** second mechanism,adversarial removal,is designed to remove these perturbations from the input image to ensure the face verification system can accurately recognize the person in the *** evaluate the effectiveness of the VeriFace system,we conducted experiments on different types of adversarial attacks using the Labelled Faces in the Wild(LFW)*** results show that the VeriFace adversarial detector can accurately identify adversarial imageswith a high detection accuracy of 100%.Additionally,our proposedVeriFace adversarial removalmethod has a significantly lower attack success rate of 6.5%compared to state-of-the-art removalmethods.
In this work, a novel methodological approach to multi-attribute decision-making problems is developed and the notion of Heptapartitioned Neutrosophic Set Distance Measures (HNSDM) is introduced. By averaging the Pent...
详细信息
The rapid growth of service-oriented and cloud computing has created large-scale data centres *** data centres’operating costs mostly come from back-end cloud infrastructure and energy *** cloud computing,extensive c...
详细信息
The rapid growth of service-oriented and cloud computing has created large-scale data centres *** data centres’operating costs mostly come from back-end cloud infrastructure and energy *** cloud computing,extensive communication resources are ***,cloud applications require more bandwidth to transfer large amounts of data to satisfy end-user *** is also essential that no communication source can cause congestion or bag loss owing to unnecessary switching *** paper proposes a novel Energy and Communication(EC)aware scheduling(EC-scheduler)algorithm for green cloud computing,which optimizes data centre energy consumption and traffic *** primary goal of the proposed EC-scheduler is to assign user applications to cloud data centre resources with minimal utilization of data *** first introduce a Multi-Objective Leader Salp Swarm(MLSS)algorithm for task sorting,which ensures traffic load balancing,and then an Emotional Artificial Neural Network(EANN)for efficient resource ***-scheduler schedules cloud user requirements to the cloud server by optimizing both energy and communication delay,which supports the lower emission of carbon dioxide by the cloud server system,enabling a green,unalloyed *** tested the proposed plan and existing cloud scheduling methods using the GreenCloud simulator to analyze the efficiency of optimizing data centre energy and other scheduler *** EC-scheduler parameters Power Usage Effectiveness(PUE),Data Centre Energy Productivity(DCEP),Throughput,Average Execution Time(AET),Energy Consumption,and Makespan showed up to 26.738%,37.59%,50%,4.34%,34.2%,and 33.54%higher efficiency,respectively,than existing state of the art schedulers concerning number of user applications and number of user requests.
Smart home automation is protective and preventive measures that are taken to monitor elderly people in a non-intrusive manner using simple and pervasive sensors termed Ambient Assistive Living. The smart home produce...
详细信息
Ransomware is one of the most advanced malware which uses high computer resources and services to encrypt system data once it infects a system and causes large financial data losses to the organization and individuals...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a ...
详细信息
This paper proposes a novel framework to detect cyber-attacks using Machine Learning coupled with User Behavior *** framework models the user behavior as sequences of events representing the user activities at such a *** represented sequences are thenfitted into a recurrent neural network model to extract features that draw distinctive behavior for individual ***,the model can recognize frequencies of regular behavior to profile the user manner in the *** subsequent procedure is that the recurrent neural network would detect abnormal behavior by classifying unknown behavior to either regu-lar or irregular *** importance of the proposed framework is due to the increase of cyber-attacks especially when the attack is triggered from such sources inside the *** detecting inside attacks are much more challenging in that the security protocols can barely recognize attacks from trustful resources at the network,including ***,the user behavior can be extracted and ultimately learned to recognize insightful patterns in which the regular patterns reflect a normal network workfl*** contrast,the irregular patterns can trigger an alert for a potential *** framework has been fully described where the evaluation metrics have also been *** experimental results show that the approach performed better compared to other approaches and AUC 0.97 was achieved using RNN-LSTM *** paper has been concluded with pro-viding the potential directions for future improvements.
The reduced visibility during the winter season in an outdoor setting can be attributed primarily to the presence of haze or fog. Despite adjusting the lens of an optical sensor system for various purposes, such as au...
详细信息
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for Io...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that h...
详细信息
Graph neural networks(GNNs)have gained traction and have been applied to various graph-based data analysis tasks due to their high ***,a major concern is their robustness,particularly when faced with graph data that has been deliberately or accidentally polluted with *** presents a challenge in learning robust GNNs under noisy *** address this issue,we propose a novel framework called Soft-GNN,which mitigates the influence of label noise by adapting the data utilized in *** approach employs a dynamic data utilization strategy that estimates adaptive weights based on prediction deviation,local deviation,and global *** better utilizing significant training samples and reducing the impact of label noise through dynamic data selection,GNNs are trained to be more *** evaluate the performance,robustness,generality,and complexity of our model on five real-world datasets,and our experimental results demonstrate the superiority of our approach over existing methods.
Generative Artificial Intelligence (GAI) is fundamentally changing the ways of working and blurring the boundaries between human and machine-generated contents. While there is an increasing interest in the adoption of...
详细信息
暂无评论