Convolutional neural networks (CNNs) are widely used in hyperspectral image (HSI) classification due to their strong feature extraction capabilities. Nevertheless, CNN-based classification methods face challenges in c...
详细信息
The adoption of deep learning-based side-channel analysis(DL-SCA)is crucial for leak detection in secure *** previous studies have applied this method to break targets protected with *** the increasing number of studi...
详细信息
The adoption of deep learning-based side-channel analysis(DL-SCA)is crucial for leak detection in secure *** previous studies have applied this method to break targets protected with *** the increasing number of studies,the problem of model *** research mainly focuses on exploring hyperparameters and network architectures,while offering limited insights into the effects of external factors on side-channel attacks,such as the number and type of *** paper proposes a Side-channel Analysis method based on a Stacking ensemble,called *** our method,multiple models are deeply *** the extended application of base models and the meta-model,Stacking-SCA effectively improves the output class probabilities of the model,leading to better ***,this method shows that the attack performance is sensitive to changes in the number of ***,five independent subsets are extracted from the original ASCAD database as multi-segment datasets,which are mutually *** method shows how these subsets are used as inputs for Stacking-SCA to enhance its attack *** experimental results show that Stacking-SCA outperforms the current state-of-the-art results on several considered datasets,significantly reducing the number of attack traces required to achieve a guessing entropy of ***,different hyperparameter sizes are adjusted to further validate the robustness of the method.
A fresh algorithm is presented for tackling the economic dispatch problem (EDP) in smart grids with directed network topology. This algorithm is based on distributed consensus and aims to minimize the total cost of po...
详细信息
Micro-expressions(MEs) have emerged as a viable strategy for affective estimation due to their high reliability in emotion detection. In recent years, deep learning methods have been successfully applied to the field ...
详细信息
This study examines how Chinese older adults leverage Douyin, a short video platform, for informal learning purposes, analyzing their usage patterns, motivations, and encountered challenges. Although Douyin was not ex...
详细信息
To further accelerate the analysis of monostatic electromagnetic (EM) scattering problems of objects, an improved compressive sensing (CS)-based model is proposed. First, an orthogonal subspace spanned by the wide-ang...
详细信息
In real-world scenarios, multi-view data comprises heterogeneous features, with each feature corresponding to a specific view. The objective of multi-view semi-supervised classification is to enhance classification pe...
详细信息
Ciphertext-Policy Attribute-Based Encryption(CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing sc...
详细信息
Ciphertext-Policy Attribute-Based Encryption(CP-ABE) enables fine-grained access control on ciphertexts, making it a promising approach for managing data stored in the cloud-enabled Internet of Things. But existing schemes often suffer from privacy breaches due to explicit attachment of access policies or partial hiding of critical attribute content. Additionally, resource-constrained IoT devices, especially those adopting wireless communication, frequently encounter affordability issues regarding decryption costs. In this paper, we propose an efficient and fine-grained access control scheme with fully hidden policies(named FHAC). FHAC conceals all attributes in the policy and utilizes bloom filters to efficiently locate them. A test phase before decryption is applied to assist authorized users in finding matches between their attributes and the access policy. Dictionary attacks are thwarted by providing unauthorized users with invalid values. The heavy computational overhead of both the test phase and most of the decryption phase is outsourced to two cloud servers. Additionally, users can verify the correctness of multiple outsourced decryption results simultaneously. Security analysis and performance comparisons demonstrate FHAC's effectiveness in protecting policy privacy and achieving efficient decryption.
Online streaming feature selection has garnered widespread attention due to its efficiency and adaptability in dynamic data environments. However, existing methods primarily focus on the correlation and redundancy amo...
详细信息
The popularization of modern digital image technology has brought convenience to us, but it also poses many risks. The advancement of image editing software allows anyone to modify image content effortlessly. If these...
详细信息
暂无评论