Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving ...
详细信息
Cross-Site Scripting(XSS)remains a significant threat to web application security,exploiting vulnerabilities to hijack user sessions and steal sensitive *** detection methods often fail to keep pace with the evolving sophistication of cyber *** paper introduces a novel hybrid ensemble learning framework that leverages a combination of advanced machine learning algorithms—Logistic Regression(LR),Support Vector Machines(SVM),eXtreme Gradient Boosting(XGBoost),Categorical Boosting(CatBoost),and Deep Neural Networks(DNN).Utilizing the XSS-Attacks-2021 dataset,which comprises 460 instances across various real-world trafficrelated scenarios,this framework significantly enhances XSS attack *** approach,which includes rigorous feature engineering and model tuning,not only optimizes accuracy but also effectively minimizes false positives(FP)(0.13%)and false negatives(FN)(0.19%).This comprehensive methodology has been rigorously validated,achieving an unprecedented accuracy of 99.87%.The proposed system is scalable and efficient,capable of adapting to the increasing number of web applications and user demands without a decline in *** demonstrates exceptional real-time capabilities,with the ability to detect XSS attacks dynamically,maintaining high accuracy and low latency even under significant ***,despite the computational complexity introduced by the hybrid ensemble approach,strategic use of parallel processing and algorithm tuning ensures that the system remains scalable and performs robustly in real-time *** for easy integration with existing web security systems,our framework supports adaptable Application Programming Interfaces(APIs)and a modular design,facilitating seamless augmentation of current *** innovation represents a significant advancement in cybersecurity,offering a scalable and effective solution for securing modern web applications against evolving threats.
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse *** to their heterogeneous nature and constrained resources...
详细信息
IoT has emerged as a game-changing technology that connects numerous gadgets to networks for communication,processing,and real-time monitoring across diverse *** to their heterogeneous nature and constrained resources,as well as the growing trend of using smart gadgets,there are privacy and security issues that are not adequately managed by conventional *** review offers a thorough analysis of contemporary AI solutions designed to enhance security within IoT *** intersection of AI technologies,including ML,and blockchain,with IoT privacy and security is systematically examined,focusing on their efficacy in addressing core security *** methodology involves a detailed exploration of existing literature and research on AI-driven privacy-preserving security mechanisms in *** reviewed solutions are categorized based on their ability to tackle specific security *** review highlights key advancements,evaluates their practical applications,and identifies prevailing research gaps and *** findings indicate that AI solutions,particularly those leveraging ML and blockchain,offerpromising enhancements to IoT privacy and security by improving threat detection capabilities and ensuring data *** paper highlights how AI technologies might strengthen IoT privacy and security and offer suggestions for upcoming studies intended to address enduring problems and improve the robustness of IoT networks.
A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic *** advancements in deep neural networks have enabled the development of models to represent traffic flow ***,accurat...
详细信息
A significant obstacle in intelligent transportation systems(ITS)is the capacity to predict traffic *** advancements in deep neural networks have enabled the development of models to represent traffic flow ***,accurately predicting traffic flow at the individual road level is extremely difficult due to the complex interplay of spatial and temporal *** paper proposes a technique for predicting short-term traffic flow data using an architecture that utilizes convolutional bidirectional long short-term memory(Conv-BiLSTM)with attention *** studies neglected to include data pertaining to factors such as holidays,weather conditions,and vehicle types,which are interconnected and significantly impact the accuracy of forecast *** addition,this research incorporates recurring monthly periodic pattern data that significantly enhances the accuracy of forecast *** experimental findings demonstrate a performance improvement of 21.68%when incorporating the vehicle type feature.
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an inte...
详细信息
High reliability applications in dense access scenarios have become one of the main goals of 6G *** solve the access collision of dense Machine Type Communication(MTC)devices in cell-free communication systems,an intelligent cooperative secure access scheme based on multi-agent reinforcement learning and federated learning is proposed,that is,the Preamble Slice Orderly Queue Access(PSOQA)*** this scheme,the preamble arrangement is combined with the access *** preamble arrangement is realized by preamble slices which is from the virtual preamble *** access devices learn to queue orderly by deep reinforcement *** orderly queue weakens the random and avoids collision.A preamble slice is assigned to an orderly access queue at each access *** orderly queue is determined by interaction information among multiple *** the federated reinforcement learning framework,the PSOQA scheme is implemented to guarantee the privacy and security of ***,the access performance of PSOQA is compared with other random contention schemes in different load *** results show that PSOQA can not only improve the access success rate but also guarantee low-latency tolerant performances.
Food Infestation Detection is more important for food safety and health concerns. It is a challenging task to separate the grains into infested or non-infested. It is found that in the existing system, there is no eff...
详细信息
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approache...
详细信息
Recently,Generative Adversarial Networks(GANs)have become the mainstream text-to-image(T2I)***,a standard normal distribution noise of inputs cannot provide sufficient information to synthesize an image that approaches the ground-truth image ***,the multistage generation strategy results in complex T2I ***,this study proposes a novel feature-grounded single-stage T2I model,which considers the“real”distribution learned from training images as one input and introduces a worst-case-optimized similarity measure into the loss function to enhance the model's generation *** results on two benchmark datasets demonstrate the competitive performance of the proposed model in terms of the Frechet inception distance and inception score compared to those of some classical and state-of-the-art models,showing the improved similarities among the generated image,text,and ground truth.
As cloud storage and multimedia communication continue to evolve, the preservation of image privacy is becoming increasingly important. Reversible data hiding in encrypted images (RDHEI) is an effective method for enh...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essenti...
详细信息
In recent decades,fog computing has played a vital role in executing parallel computational tasks,specifically,scientific workflow *** cloud data centers,fog computing takes more time to run workflow ***,it is essential to develop effective models for Virtual Machine(VM)allocation and task scheduling in fog computing *** task scheduling,VM migration,and allocation,altogether optimize the use of computational resources across different fog *** process ensures that the tasks are executed with minimal energy consumption,which reduces the chances of resource *** this manuscript,the proposed framework comprises two phases:(i)effective task scheduling using a fractional selectivity approach and(ii)VM allocation by proposing an algorithm by the name of Fitness Sharing Chaotic Particle Swarm Optimization(FSCPSO).The proposed FSCPSO algorithm integrates the concepts of chaos theory and fitness sharing that effectively balance both global exploration and local *** balance enables the use of a wide range of solutions that leads to minimal total cost and makespan,in comparison to other traditional optimization *** FSCPSO algorithm’s performance is analyzed using six evaluation measures namely,Load Balancing Level(LBL),Average Resource Utilization(ARU),total cost,makespan,energy consumption,and response *** relation to the conventional optimization algorithms,the FSCPSO algorithm achieves a higher LBL of 39.12%,ARU of 58.15%,a minimal total cost of 1175,and a makespan of 85.87 ms,particularly when evaluated for 50 tasks.
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource *** traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenge...
详细信息
Crowdsourcing technology is widely recognized for its effectiveness in task scheduling and resource *** traditional methods for task allocation can help reduce costs and improve efficiency,they may encounter challenges when dealing with abnormal data flow nodes,leading to decreased allocation accuracy and *** address these issues,this study proposes a novel two-part invalid detection task allocation *** the first step,an anomaly detection model is developed using a dynamic self-attentive GAN to identify anomalous *** to the baseline method,the model achieves an approximately 4%increase in the F1 value on the public *** the second step of the framework,task allocation modeling is performed using a twopart graph matching *** phase introduces a P-queue KM algorithm that implements a more efficient optimization *** allocation efficiency is improved by approximately 23.83%compared to the baseline *** results confirm the effectiveness of the proposed framework in detecting abnormal data nodes,enhancing allocation precision,and achieving efficient allocation.
Defects in multistage manufacturing processes (MMPs) decrease profitability and product quality. Therefore, MMP parameter optimization within a range is essential to prevent defects, achieve dynamic accuracy, and acco...
详细信息
暂无评论