The increasing use of digital payment systems has led to a rise in fraudulent activities, presenting a significant challenge in ensuring secure transactions. This research focuses on implementing the Support Vector Ma...
详细信息
Breast cancer is among the most prevalent cancers, and early detection is crucial to successful treatment. One of the most crucial phases of breast cancer treatment is a correct diagnosis. Numerous studies exist about...
详细信息
Cardiovascular magnetic resonance (CMR) imaging is a radiation-free modality widely used for functional and structural evaluation of the cardiovascular system. Achieving an accurate diagnosis requires having good-qual...
详细信息
During the last few years, there has been a growing interest in the topic of using natural or synthetic esters as an alternative to mineral oils in oil transformers due to the easier way to obtain them and their abili...
详细信息
Multi SVM has long been one of the popular methods in classification, while DCNN has recently gained significant attention in image processing and pattern recognition. This research evaluates the effectiveness of Mult...
详细信息
With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber *** complexity and heterogeneity of smart cities have become vulnerable...
详细信息
With the prevalence of the Internet of Things(IoT)systems,smart cities comprise complex networks,including sensors,actuators,appliances,and cyber *** complexity and heterogeneity of smart cities have become vulnerable to sophisticated cyber-attacks,especially privacy-related attacks such as inference and data poisoning *** Learning(FL)has been regarded as a hopeful method to enable distributed learning with privacypreserved intelligence in IoT *** though the significance of developing privacy-preserving FL has drawn as a great research interest,the current research only concentrates on FL with independent identically distributed(i.i.d)data and few studies have addressed the non-i.i.d *** is known to be vulnerable to Generative Adversarial Network(GAN)attacks,where an adversary can presume to act as a contributor participating in the training process to acquire the private data of other *** paper proposes an innovative Privacy Protection-based Federated Deep Learning(PP-FDL)framework,which accomplishes data protection against privacy-related GAN attacks,along with high classification rates from non-i.i.d ***-FDL is designed to enable fog nodes to cooperate to train the FDL model in a way that ensures contributors have no access to the data of each other,where class probabilities are protected utilizing a private identifier generated for each *** PP-FDL framework is evaluated for image classification using simple convolutional networks which are trained using MNIST and CIFAR-10 *** empirical results have revealed that PF-DFL can achieve data protection and the framework outperforms the other three state-of-the-art models with 3%–8%as accuracy improvements.
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of ...
详细信息
Properly created and securely communicated,non-disclosure agreement(NDA)can resolve most of the common disputes related to outsourcing of offshore software maintenance(OSMO).Occasionally,these NDAs are in the form of *** the work is done offshore,these agreements or images must be shared through the Internet or stored over the *** breach of privacy,on the other hand,is a potential threat for the image owners as both the Internet and cloud servers are not void of *** article proposes a novel algorithm for securing the NDAs in the form of *** an agreement is signed between the two parties,it will be encrypted before sending to the cloud server or travelling through the public network,the *** the image is input to the algorithm,its pixels would be scrambled through the set of randomly generated rectangles for an arbitrary amount of *** confusion effects have been realized through an XOR operation between the confused image,and chaotic ***,5D multi-wing hyperchaotic system has been employed to spawn the chaotic vectors due to good properties of chaoticity it *** machine experimentation and the security analysis through a comprehensive set of validation metric vividly demonstrate the robustness,defiance to the multifarious threats and the prospects for some real-world application of the proposed encryption algorithm for the NDA images.
This paper presents a comprehensive review of deep learning methods for the Big Five personality traits prediction using multi-task classification. The purpose of the review is to determine the performance of models d...
详细信息
Unsupervised clustering and clustering validity are used as essential instruments of data *** clustering being realized under uncertainty,validity indices do not deliver any quantitative evaluation of the uncertaintie...
详细信息
Unsupervised clustering and clustering validity are used as essential instruments of data *** clustering being realized under uncertainty,validity indices do not deliver any quantitative evaluation of the uncertainties in the suggested ***,validity measures may be biased towards the underlying clustering ***,neglecting a confidence requirement may result in *** the absence of an error estimate or a confidence parameter,probable clustering errors are forwarded to the later stages of the ***,having an uncertainty margin of the projected labeling can be very fruitful for many applications such as machine ***,the validity issue was approached through estimation of the uncertainty and a novel low complexity index proposed for fuzzy *** involves only uni-dimensional membership weights,regardless of the data dimension,stipulates no specific distribution,and is independent of the underlying similarity *** tests and comparisons returned that it can reliably estimate the optimum number of partitions under different data distributions,besides behaving more robust to over ***,in the comparative correlation analysis between true clustering error rates and some known internal validity indices,the suggested index exhibited the highest strong *** relationship has been also proven stable through additional statistical acceptance *** the provided relative uncertainty measure can be used as a probable error estimate in the clustering as ***,it is the only method known that can exclusively identify data points in dubiety and is adjustable according to the required confidence level.
Effective and efficient cyber incident handling is crucial for maintaining the security of information systems and organizational data. This research aims to develop a priority-based cyber incident handling method by ...
详细信息
暂无评论