This paper introduces an advanced road damage detection algorithm that effectively addresses the shortcomings of existing models, including limited detection performance and large parameter sizes, by utilizing the YOL...
详细信息
Diabetes retinopathy (DR) is one of the complications of diabetes. Early diagnosis of retinopathy is helpful to avoid vision loss or blindness. The difficulty of this task lies in the significant differences in the si...
详细信息
Background: The main objective of the Internet of Things (IoT) has significantly influenced and altered technology, such as interconnection, interoperability, and sensor devices. To ensure seamless healthcare faciliti...
详细信息
Task scheduling for virtual machines (VMs) has shown to be essential for the effective development of cloud computing at the lowest cost and fastest turnaround time. A number of research gaps about job schedule optimi...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
To address the privacy concerns that arise from centralizing model training on a large number of IoT devices, a revolutionary new distributed learning framework called federated learning has been developed. This setup...
详细信息
With the great development of Multi-Target Tracking(MTT)technologies,many MTT algorithms have been proposed with their own advantages and *** to the fact that requirements to MTT algorithms vary from the application s...
详细信息
With the great development of Multi-Target Tracking(MTT)technologies,many MTT algorithms have been proposed with their own advantages and *** to the fact that requirements to MTT algorithms vary from the application scenarios,performance evaluation is significant to select an appropriate MTT algorithm for the specific application *** this paper,we propose a performance evaluation method on the sets of trajectories with temporal dimension specifics to compare the estimated trajectories with the true *** proposed method evaluates the estimate results of an MTT algorithm in terms of tracking accuracy,continuity and ***,its computation is based on a multi-dimensional assignment problem,which is formulated as a computable form using linear *** enhance the influence of recent estimated states of the trajectories in the evaluation,an attention function is used to reweight the trajectory errors at different time ***,simulation results show that the proposed performance evaluation method is able to evaluate many aspects of the MTT *** evaluations are worthy for selecting suitable MTT algorithms in different application scenarios.
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the d...
详细信息
In traditional digital twin communication system testing,we can apply test cases as completely as possible in order to ensure the correctness of the system implementation,and even then,there is no guarantee that the digital twin communication system implementation is completely *** verification is currently recognized as a method to ensure the correctness of software system for communication in digital twins because it uses rigorous mathematical methods to verify the correctness of systems for communication in digital twins and can effectively help system designers determine whether the system is designed and implemented *** this paper,we use the interactive theorem proving tool Isabelle/HOL to construct the formal model of the X86 architecture,and to model the related assembly *** verification result shows that the system states obtained after the operations of relevant assembly instructions is consistent with the expected states,indicating that the system meets the design expectations.
Risk prediction is an important task to ensuring the driving safety of railway trams. Although data-driven intelligent methods are proved to be effective for driving risk prediction, accuracy is still a top concern fo...
详细信息
Risk prediction is an important task to ensuring the driving safety of railway trams. Although data-driven intelligent methods are proved to be effective for driving risk prediction, accuracy is still a top concern for the challenges of data quality which mainly represent as the unbalanced datasets. This study focuses on applying feature extraction and data augmentation methods to achieve effective risk prediction for railway trams, and proposes an approach based on a self-adaptive K-means clustering algorithm and the least squares deep convolution generative adversarial network(LS-DCGAN). The data preprocessing methods are proposed, which include the K-means algorithm to cluster the locations of trams and the extreme gradient boosting recursive feature elimination based feature selection algorithm to retain the key features. The LS-DCGAN model is designed for sparse sample expansion, aiming to address the sample category distribution imbalance problem. The experiments implemented with the public and real datasets show that the proposed approach can reach a high accuracy of 90.69%,which can greatly enhances the tram driving safety.
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential sec...
详细信息
ChatGPT is a powerful artificial intelligence(AI)language model that has demonstrated significant improvements in various natural language processing(NLP) tasks. However, like any technology, it presents potential security risks that need to be carefully evaluated and addressed. In this survey, we provide an overview of the current state of research on security of using ChatGPT, with aspects of bias, disinformation, ethics, misuse,attacks and privacy. We review and discuss the literature on these topics and highlight open research questions and future *** this survey, we aim to contribute to the academic discourse on AI security, enriching the understanding of potential risks and mitigations. We anticipate that this survey will be valuable for various stakeholders involved in AI development and usage, including AI researchers, developers, policy makers, and end-users.
暂无评论