MACHINE LEARNING REQUIRES AUTOMATION Machine learning (ML) is a fundamental technology of artificial intelligence(AI) that focuses on searching the possibly existing mapping f:x→y to fit a given dataset D={(xi,y...
详细信息
MACHINE LEARNING REQUIRES AUTOMATION Machine learning (ML) is a fundamental technology of artificial intelligence(AI) that focuses on searching the possibly existing mapping f:x→y to fit a given dataset D={(xi,yi)}i=1N,where each (x,y)∈x×y?Rd×R.
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neur...
详细信息
Previous studies have shown that deep learning is very effective in detecting known ***,when facing unknown attacks,models such as Deep Neural networks(DNN)combined with Long Short-Term Memory(LSTM),Convolutional Neural networks(CNN)combined with LSTM,and so on are built by simple stacking,which has the problems of feature loss,low efficiency,and low ***,this paper proposes an autonomous detectionmodel for Distributed Denial of Service attacks,Multi-Scale Convolutional Neural network-Bidirectional Gated Recurrent Units-Single Headed Attention(MSCNN-BiGRU-SHA),which is based on a Multistrategy Integrated Zebra Optimization Algorithm(MI-ZOA).The model undergoes training and testing with the CICDDoS2019 dataset,and its performance is evaluated on a new GINKS2023 *** hyperparameters for Conv_filter and GRU_unit are optimized using the Multi-strategy Integrated Zebra Optimization Algorithm(MIZOA).The experimental results show that the test accuracy of the MSCNN-BiGRU-SHA model based on the MIZOA proposed in this paper is as high as 0.9971 in the CICDDoS 2019 *** evaluation accuracy of the new dataset GINKS2023 created in this paper is *** to the MSCNN-BiGRU-SHA model based on the Zebra Optimization Algorithm(ZOA),the detection accuracy on the GINKS2023 dataset has improved by 5.81%,precisionhas increasedby 1.35%,the recallhas improvedby 9%,and theF1scorehas increasedby 5.55%.Compared to the MSCNN-BiGRU-SHA models developed using Grid Search,Random Search,and Bayesian Optimization,the MSCNN-BiGRU-SHA model optimized with the MI-ZOA exhibits better performance in terms of accuracy,precision,recall,and F1 score.
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly mo...
详细信息
In contrast to the general population, behavior recognition among the elderly poses increased specificity and difficulty, rendering the reliability and usability aspects of safety monitoring systems for the elderly more challenging. Hence, this study proposes a multi-modal perception-based solution for an elderly safety monitoring recognition system. The proposed approach introduces a recognition algorithm based on multi-modal cross-attention mechanism, innovatively incorporating complex information such as scene context and voice to achieve more accurate behavior recognition. By fusing four modalities, namely image, skeleton, sensor data, and audio, we further enhance the accuracy of recognition. Additionally, we introduce a novel human-robot interaction mode, where the system associates directly recognized intentions with robotic actions without explicit commands, delivering a more natural and efficient elderly assistance paradigm. This mode not only elevates the level of safety monitoring for the elderly but also facilitates a more natural and efficient caregiving approach. Experimental results demonstrate significant improvement in recognition accuracy for 11 typical elderly behaviors compared to existing methods.
Modern quantitative finance and portfolio-based investment hinge on the dependence structure among financial instruments (like stocks) for return prediction, risk management, and hedging. Several attempts have been ma...
详细信息
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a...
详细信息
Until now,some reversible data hiding in encrypted images(RDH-EI)schemes based on secret sharing(SIS-RDHEI)still have the problems of not realizing diffusivity and high embedding ***,this paper innovatively proposes a high capacity RDH-EI scheme that combines adaptive most significant bit(MSB)prediction with secret sharing ***,adaptive MSB prediction is performed on the original image and cryptographic feedback secret sharing strategy encrypts the spliced pixels to spare embedding *** the data hiding phase,each encrypted image is sent to a data hider to embed the secret information *** r copies of the image carrying the secret text are collected,the original image can be recovered lossless and the secret information can be *** evaluation shows that the proposed method in this paper has the diffusivity,reversibility,and *** last but the most important,it has higher embedding *** 512 ×512 grayscale images,the average embedding rate reaches 4.7358 bits per pixel(bpp).Compared to the average embedding rate that can be achieved by the Wang et al.'s SIS-RDHEI scheme,the proposed scheme with(2,2),(2,3),(2,4),(3,4),and(3,5)-threshold can increase by 0.7358 bpp,2.0658 bpp,2.7358 bpp,0.7358 bpp,and 1.5358 bpp,respectively.
Graph data are ubiquitous in real-world systems such as social networks and protein-protein interaction networks. In many applications, nodes usually are associated with real-value attributes, e.g., age, income, and w...
详细信息
PROBLEM Deep neural networks (DNNs) have recently achieved impressive performance in various *** successis largely attributed to massive but carefully labeled data expected to properly and sufficiently simulate testin...
PROBLEM Deep neural networks (DNNs) have recently achieved impressive performance in various *** successis largely attributed to massive but carefully labeled data expected to properly and sufficiently simulate testing ***,the data collection and annotation processes are often expensiveand time consuming,making obtained training datasets in real-life applications error prone,especially with data biasfrom ideal testing distributions.
The complexity and uncertainty in power systems cause great challenges to controlling power *** a popular data-driven technique,deep reinforcement learning(DRL)attracts attention in the control of power ***,DRL has so...
详细信息
The complexity and uncertainty in power systems cause great challenges to controlling power *** a popular data-driven technique,deep reinforcement learning(DRL)attracts attention in the control of power ***,DRL has some inherent drawbacks in terms of data efficiency and *** paper presents a novel hierarchical task planning(HTP)approach,bridging planning and DRL,to the task of power line flow ***,we introduce a threelevel task hierarchy to model the task and model the sequence of task units on each level as a task planning-Markov decision processes(TP-MDPs).Second,we model the task as a sequential decision-making problem and introduce a higher planner and a lower planner in HTP to handle different levels of task *** addition,we introduce a two-layer knowledge graph that can update dynamically during the planning procedure to assist *** results conducted on the IEEE 118-bus and IEEE 300-bus systems demonstrate our HTP approach outperforms proximal policy optimization,a state-of-the-art deep reinforcement learning(DRL)approach,improving efficiency by 26.16%and 6.86%on both systems.
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribu...
详细信息
Conditional proxy re-encryption(CPRE)is an effective cryptographic primitive language that enhances the access control mechanism and makes the delegation of decryption permissions more granular,but most of the attribute-based conditional proxy re-encryption(AB-CPRE)schemes proposed so far do not take into account the importance of user attributes.A weighted attribute-based conditional proxy re-encryption(WAB-CPRE)scheme is thus designed to provide more precise decryption rights *** introducing the concept of weight attributes,the quantity of system attributes managed by the server is reduced *** the same time,a weighted tree structure is constructed to simplify the expression of access structure *** conditional proxy re-encryption,large amounts of data and complex computations are outsourced to cloud servers,so the data owner(DO)can revoke the user’s decryption rights directly with minimal *** scheme proposed achieves security against chosen plaintext attacks(CPA).Experimental simulation results demonstrated that the decryption time is within 6–9 ms,and it has a significant reduction in communication and computation cost on the user side with better functionality compared to other related schemes,which enables users to access cloud data on devices with limited resources.
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security pr...
详细信息
In recent years,the rapid development of Internet technology has constantly enriched people's daily life and gradually changed from the traditional computer terminal to the mobile *** with it comes the security problems brought by the mobile *** for Android system,due to its open source nature,malicious applications continue to emerge,which greatly threatens the data security of ***,this paper proposes a method of trusted embedded static measurement and data transmission protection architecture based on Android to reduce the risk of data leakage in the process of terminal storage and *** conducted detailed data and feasibility analysis of the proposed method from the aspects of time consumption,storage overhead and *** experimental results show that this method can detect Android system layer attacks such as self-booting of the malicious module and improve the security of data encryption and transmission process *** with the native system,the additional performance overhead is small.
暂无评论