In this paper, we present a Federated Learning-based Intrusion Detection System (FL-IDS) aimed at enhancing security in Connected Autonomous Vehicles (CAVs) within IoT environments. The novelty lies in the dual utiliz...
详细信息
In this paper, we present a Federated Learning-based Intrusion Detection System (FL-IDS) aimed at enhancing security in Connected Autonomous Vehicles (CAVs) within IoT environments. The novelty lies in the dual utilization of Support Vector Machine (SVM) and Convolutional Neural Networks (CNN) for anomaly detection, leveraging the Flower framework for privacy-preserving, decentralized model training. Unlike traditional centralized approaches, FL-IDS ensures data confidentiality by sharing only model updates. Using the NSL-KDD dataset, our evaluation highlights superior accuracy and loss metrics, validating the efficiency of both machine learning and deep learning methods for detecting DDoS, Probe, and U2R attacks. This work contributes to the advancement of secure and efficient vehicular communication systems, providing scalable solutions for real-world IoT deployments.
Behavioral biology is one of the crucial and trending topics these days which needs proper attention by scholars for rapid development in this field. Therefore, the purpose of this paper is to ease the process of coll...
详细信息
Behavioral biology is one of the crucial and trending topics these days which needs proper attention by scholars for rapid development in this field. Therefore, the purpose of this paper is to ease the process of collecting all kinds of relevant and vital data available on the internet regarding this topic in different forms of media, such as news articles, research papers, and YouTube lecture videos, all into one place into a single document in a proper summarized form. For proper training of the LSTM model, the lengthy video and journal datasets are pre-processed using the T5 transformer model to generate a uniform training dataset. So, in this work, a comprehensive approach is proposed based on an abstractive form of text summarization using the seq2seq encoder-decoder model combined with a stacked LSTM layer with an attention mechanism and a T5 transformer model pre-processor. Therefore, a proper hybrid model, T5LSTM-RNN, is implemented to generate the summarized data.
The paper presents investigations concerning the decision rule filtering process controlled by the estimated relevance of available attributes. In the conducted study, two search directions were used, sequential forwa...
详细信息
The internet's explosive expansion has paved the way for a wide range of smartphone applications that use QR codes and digital wallets to facilitate online payments. Security is a major concern for web-based appli...
详细信息
ISBN:
(数字)9798331540364
ISBN:
(纸本)9798331540371
The internet's explosive expansion has paved the way for a wide range of smartphone applications that use QR codes and digital wallets to facilitate online payments. Security is a major concern for web-based applications since they are being delivered over the Internet at a rapid pace. Due to unlawful access to many accounts, which causes problems with end-to-end security, the security of these applications has grown to be a top concern for both customers and business owners. This work has addressed the several models that are accessible for security applications, also provided a comparative analysis of all the models, taking into account their security privacy, adaptability, accuracy reliability, vulnerabilities and suitability for digital wallets and online payment systems through QR codes.
The landscape of natural language processing (NLP) has been revolutionized by advancements that enable the upstream training of knowledge-rich models for downstream tasks, particularly named entity recognition (NER). ...
详细信息
In the paper, the authors check the behaviour of Bluetooth Low Energy protocol in a popular smart wristband and a microcontroller in the heart rate monitoring application. The measurements were collected using a devel...
详细信息
In the paper, the authors check the behaviour of Bluetooth Low Energy protocol in a popular smart wristband and a microcontroller in the heart rate monitoring application. The measurements were collected using a development board with the ESP32 System on Chip. The authors tested measurement period stability and measurement reliability in various conditions.
作者:
Urszula StańczykDepartment of Computer Graphics
Vision and Digital Systems Faculty of Automatic Control Electronics and Computer Science Silesian University of Technology Akademicka 2A 44-100 Gliwice Poland
In the context of data imbalance probably the most investigated problem is imbalance of classes, as learning from the data with this characteristic makes detection of existing patterns for all classes more difficult. ...
详细信息
In the context of data imbalance probably the most investigated problem is imbalance of classes, as learning from the data with this characteristic makes detection of existing patterns for all classes more difficult. However, other problems related to imbalance also exists and the paper addresses such cases where classes are balanced, but there is in-class imbalance. Such imbalance can be caused by uneven representation of sub-concepts. When there is a noticeable difference between the numbers of samples belonging to sub-concepts, this can turn the under-represented sub-concepts into disjuncts. Data irregularities of this type can hinder recognition, therefore actions are typically taken to restore balance. In the investigations described, the issue was studied in the stylometric domain and various classifiers were applied to the data that was balanced, then imbalanced, and finally with restored balance. The experiments show that the specifics of the domain of application can put its own mark on the data which is difficult to overcome by standard processing such as under- or oversampling. Observed dependence on a learner and dataset makes the issue even more complex and layered, and shows the need for deeper studies.
Language disparities have always existed in human civilization. In their community, deaf individuals use sign languages to communicate with one another, but it can be difficult to do so when interacting with the wider...
详细信息
The paper presents research dedicated to observations of relations between attribute properties and discretisation. In the investigations described, the gradually increasing sets of features were discretised by select...
详细信息
The paper presents research dedicated to observations of relations between attribute properties and discretisation. In the investigations described, the gradually increasing sets of features were discretised by selected approaches, and several variants of data were constructed. The continuous, partially discrete, and completely translated datasets were explored by the chosen classifiers and their performance studied in the context of a number of discretised attributes, discretisation procedures, and the way of processing of features and datasets. The stylometric problem of authorship attribution was the machine learning task under study. The experimental results enable to observe closer the specificity of style-markers employed as characteristic features, and indicate conditions for efficient recognition of authorship. They can be extended to other application domains with similar characteristics.
The paper demonstrates the research methodology focused on observations of relations between attribute relevance, displayed by rankings, and discretisation. Instead of transforming all continuous attributes before dat...
详细信息
暂无评论