Customer complaints are an important aspect in the business world. Every company must face complaints from its customers, whether related to unsatisfactory products, services or experiences. Customer complaints are a ...
详细信息
Significant advancements in information technology have altered existing markets, transforming them from physical to online electronic markets (e-commerce). The practice of conducting business online by smaller and me...
详细信息
Palm vein pattern recognition offers a unique personal identification feature. Unfortunately, these techniques typically require a Near Infrared (NIR) camera sensor to extract the individual's venous pattern, chal...
详细信息
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned D...
详细信息
ISBN:
(数字)9798331513320
ISBN:
(纸本)9798331513337
This exponential proliferation of IoT devices is creating an ever-growing demand for efficient cybersecurity solutions in resource-constrained environments. In this study, we propose Edge-IoTDistilBERT, a fine-tuned DistilBERT model, intended for the multi-class classification of network packet attacks within IoT ecosystems. Our proposed model was trained on the Edge-IIoT dataset, representative of all traffic classes and attack variants with high accuracy of up to 99.99%, outperforming state-of-the-art solutions. The new preprocessing pipeline of PCAP to text would transform the network traffic to a textual form allowing the model to learn the pattern in the dataset and making it able to generalize its content. Our fine-tuned model show a robust result on imbalanced dataset with two diffrent splits namely 80–20 and 70–30. The result shown by Edge-IoTDistilBERT place this model as a feasible effective cybersecurity solution for IoT networks, offering a good trade-off between high performance and resource constraints linked to edge devices.
In recent times, there has been considerable attention directed towards Facial Expression Recognition (FER) due to its extensive utility across diverse domains. However, the universality of facial expressions has been...
详细信息
The growing focus on microcredentials emphasizes the urgent need for precise and widely accepted definitions, as existing uncertainties hinder their effective implementation. This research aims to investigate the comp...
详细信息
Symmetric algorithms offer speed but have weaknesses in key distribution, while asymmetric algorithms are secure but less efficient for encrypting and decrypting large text messages. This research aims to secure data ...
详细信息
The expansion of deep learning techniques, as well as the availability of large audio/sound datasets, have fueled tremendous breakthroughs in audio/sound classification during the last several years. The transfer lear...
详细信息
Our conventional architecture design tool converted instructions of microprocessor (MPU) into meta-instructions with both semantic and functional expressions, and it displayed a circuit diagram of the meta-instruction...
详细信息
作者:
Liawatimena, SuryadiputraGunawan, DevinaBina Nusantara University
Automotive & Robotics Program Computer Engineering Department BINUS ASO School of Engineering Computer Science Deparment BINUS Graduate Program Master of Computer Science Jakarta11480 Indonesia Bina Nusantara University
Automotive & Robotics Program Computer Engineering Department BINUS ASO School of Engineering Jakarta11480 Indonesia
Modern retail businesses face a significant challenge with the inefficiency of manually changing price labels on shelves. This manual process not only consumes valuable time and resources but also increases the likeli...
详细信息
暂无评论