Social influence is everywhere in people's lives. It controls users' activities in social networks. Understanding the mechanism of interactions between users in social networks can benefit various applications...
详细信息
Social anxiety is a psychological disorder distinguished by a profound apprehension of social environments, leading to irrational anxiety among individuals. This excessive fear of social situations affects a considera...
详细信息
Emotion recognition by facial expression is a challenging task that has gotten much attention in recent years. Deep neural networks are used to extract pertinent information from facial photographs and categorise them...
详细信息
Road traffic injuries rank among the leading causes of death worldwide, with motorcyclists accounting for a significant proportion of these fatalities. According to the World Health Organization, helmets are effective...
详细信息
In recent years, detecting image forgery has become an important topic because of the availability of efficient and sophisticated image-editing software. Copy-move forgery, which involves copying a section of an image...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,com...
详细信息
Border Gateway Protocol(BGP),as the standard inter-domain routing protocol,is a distance-vector dynamic routing protocol used for exchanging routing information between distributed Autonomous Systems(AS).BGP nodes,communicating in a distributed dynamic environment,face several security challenges,with trust being one of the most important issues in inter-domain *** research,which performs trust evaluation when exchanging routing information to suppress malicious routing behavior,cannot meet the scalability requirements of BGP *** this paper,we propose a blockchain-based trust model for inter-domain *** model achieves scalability by allowing the master node of an AS alliance to transmit the trust evaluation data of its member nodes to the *** BGP nodes can expedite the trust evaluation process by accessing a global view of other BGP nodes through the master node of their respective *** incorporate security service evaluation before direct evaluation and indirect recommendations to assess the security services that BGP nodes provide for themselves and prioritize to guarantee their security of routing *** forward the trust evaluation for neighbor discovery and prioritize the nodes with high trust as neighbor nodes to reduce the malicious exchange routing *** use simulation software to simulate a real BGP environments and employ a comparative experimental research approach to demonstrate the performance evaluation of our trust *** with the classical trust model,our trust model not only saves more storage overhead,but also provides higher security,especially reducing the impact of collusion attacks.
As more and more privacy protection mechanisms are introduced, facial recognition is gradually being optimized in terms of homo-morphic computing power. However, certain aspects have been overlooked, such as the rever...
详细信息
WiFi Channel State Information (CSI)-based gesture recognition offers unique advantages, including cost-effectiveness and enhanced privacy protection, and has garnered significant attention in recent years. However, e...
详细信息
This research introduces DeepFakeGuard, a hybrid deep learning framework designed to detect fake profiles on social media platforms, addressing the growing threat of fraudulent accounts online. DeepFakeGuard integrate...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the huma...
详细信息
Biometrics,which has become integrated with our daily lives,could fall prey to falsification attacks,leading to security *** our paper,we use Transient Evoked Otoacoustic Emissions(TEOAE)that are generated by the human cochlea in response to an external sound stimulus,as a biometric *** are robust to falsification attacks,as the uniqueness of an individual’s inner ear cannot be *** this study,we use both the raw 1D TEOAE signals,as well as the 2D time-frequency representation of the signal using Continuous Wavelet Transform(CWT).We use 1D and 2D Convolutional Neural Networks(CNN)for the former and latter,respectively,to derive the feature *** corresponding lower-dimensional feature maps are obtained using principal component analysis,which is then used as features to build classifiers using machine learning techniques for the task of person identification.T-SNE plots of these feature maps show that they discriminate well among the *** the various architectures explored,we achieve a best-performing accuracy of 98.95%and 100%using the feature maps of the 1D-CNN and 2D-CNN,respectively,with the latter performance being an improvement over all the earlier *** performance makes the TEOAE based person identification systems deployable in real-world situations,along with the added advantage of robustness to falsification attacks.
暂无评论