The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature ...
详细信息
The proposed work objective is to adapt Online social networking (OSN) is a type of interactive computer-mediated technology that allows people to share information through virtual networks. The microblogging feature of Twitter makes cyberspace prominent (usually accessed via the dark web). The work used the datasets and considered the Scrape Twitter Data (Tweets) in Python using the SN-Scrape module and Twitter 4j API in JAVA to extract social data based on hashtags, which is used to select and access tweets for dataset design from a profile on the Twitter platform based on locations, keywords, and hashtags. The experiments contain two datasets. The first dataset has over 1700 tweets with a focus on location as a keypoint (hacking-for-fun data, cyber-violence data, and vulnerability injector data), whereas the second dataset only comprises 370 tweets with a focus on reposting of tweet status as a keypoint. The method used is focused on a new system model for analysing Twitter data and detecting terrorist attacks. The weights of susceptible keywords are found using a ternary search by the Aho-Corasick algorithm (ACA) for conducting signature and pattern matching. The result represents the ACA used to perform signature matching for assigning weights to extracted words of tweet. ML is used to evaluate Twitter data for classifying patterns and determining the behaviour to identify if a person is a terrorist. SVM (Support Vector Machine) proved to be a more accurate classifier for predicting terrorist attacks compared to other classifiers (KNN- K-Nearest Neighbour and NB-Naïve Bayes). The 1st dataset shows the KNN-Acc. -98.38% and SVM Accuracy as 98.85%, whereas the 2nd dataset shows the KNN-Acc. -91.68% and SVM Accuracy as 93.97%. The proposed work concludes that the generated weights are classified (cyber-violence, vulnerability injector, and hacking-for-fun) for further feature classification. Machine learning (ML) [KNN and SVM] is used to predict the occurrence and
As overlapping community detection algorithms continue to mature, the issue of information being over-mined has also become apparent. Existing overlapping community hiding algorithms are inadequate. Therefore, in this...
详细信息
-Image splicing is widely recognized as the predominant technique in image manipulation. Most current splicing detection methods have low accuracy and poor localization of small-sized splicing areas. Therefore, we des...
详细信息
With the widespread application of federated learning across various domains, backdoor attacks pose a serious threat to the security of models. In this paper, we proposes a text watermarking-based federated learning b...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology...
详细信息
This paper addresses the critical challenge of privacy in Online Social Networks(OSNs),where centralized designs compromise user *** propose a novel privacy-preservation framework that integrates blockchain technology with deep learning to overcome these *** methodology employs a two-tier architecture:the first tier uses an elitism-enhanced Particle Swarm Optimization and Gravitational Search Algorithm(ePSOGSA)for optimizing feature selection,while the second tier employs an enhanced Non-symmetric Deep Autoencoder(e-NDAE)for anomaly ***,a blockchain network secures users’data via smart contracts,ensuring robust data *** tested on the NSL-KDD dataset,our framework achieves 98.79%accuracy,a 10%false alarm rate,and a 98.99%detection rate,surpassing existing *** integration of blockchain and deep learning not only enhances privacy protection in OSNs but also offers a scalable model for other applications requiring robust security measures.
Dynamic resource discovery in a network of dispersed computing resources is an open problem. The establishment and maintenance of resource pool information are critical, which involves both the polymorphic migration o...
详细信息
Dynamic resource discovery in a network of dispersed computing resources is an open problem. The establishment and maintenance of resource pool information are critical, which involves both the polymorphic migration of the network and the time and energy costs resulting from node selection and frequent interactions of information between nodes. The resource discovery problem for dispersed computing can be considered a dynamic multi-level decision problem. A bi-level programming model of dispersed computing resource discovery is developed, which is driven by time cost, energy consumption and accuracy of information acquisition. The upper-level model is to design a reasonable network structure of resource discovery, and the lower-level model is to explore an effective discovery mode. Complex network topology features are used for the first time to analyze the polymorphic migration characteristics of resource discovery networks. We propose an integrated calibration method for energy consumption parameters based on two discovery modes(i.e., agent mode and self-directed mode). A symmetric trust region based heuristic algorithm is proposed for solving the system model. The numerical simulation is performed in a dispersed computing network with multiple modes and topological states, which proves the feasibility of the model and the effectiveness of the algorithm.
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sen...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sensing and ***,the collision avoidance performance of CAVs with unexpected obstacles has not been studied in the existing *** this paper,we first design a platoon-based collision avoidance framework for *** this framework,we deploy a Digital Twin(DT)system at the head vehicle in a platoon to reduce communication overhead and decision-making delay based on a proposed trajectory planning *** addition,a DT-assistant system is deployed on the assistant vehicle to monitor vehicles out of the sensing range of the head vehicle for the maintenance of the DT *** this case,the transmission frequency of kinetic states of platoon members can be reduced to ensure low-overhead ***,we design a variable resource reservation interval that can ensure DT synchronization between DT and the assistant system with high *** further improve road safety,an urgency level-based trajectory planning algorithm is proposed to avoid unexpected obstacles considering different levels of emergency *** results show that our DT system-based scheme can achieve significant performance gains in unexpected obstacle *** to the existing schemes,it can reduce collisions by 95%and is faster by about 10%passing by the unexpected obstacle.
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a...
详细信息
The prevalence of social media and mobile computing has led to intensive user engagement in the emergent Cyber-Physical-Social-Thinking(CPST)***,the easy access,the lack of governance,and excessive use has generated a raft of new behaviors within CPST,which affects users’physical,social,and mental *** this paper,we conceive the Cyber-Syndrome concept to denote the collection of cyber disorders due to excessive or problematic Cyberspace interactions based on CPST *** we characterize the Cyber-Syndrome concept in terms of Maslow’s theory of Needs,from which we establish an in-depth theoretical understanding of Cyber-Syndrome from its etiology,formation,symptoms,and ***,we propose an entropy-based Cyber-Syndrome control mechanism for its computation and *** goal of this study is to give new insights into this rising phenomenon and offer guidance for further research and development.
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual...
详细信息
This paper investigates a simultaneous-transmitting-and-reflecting fully-connected reconfigurable intelligent surface(STAR-FC-RIS) empowered integrated sensing and multiuser communications(ISAMC) network, where a dual-functional radar-communication base station detects a malicious radar target nearby and communicates with multiple legitimate users on the other side of the STAR-RIS. We utilize an integrated architecture that combines the fully-connected(FC)-RIS, an emerging type of beyond-diagonal(BD)-RIS, with the time-switching(TS)-STAR-RIS to enhance both the sensing and communications at the cost of possible target intercepting and propose the simultaneous-transmitting-and-reflecting fully-connected RIS(STAR-FCR) schemes to strike a balance between sensing and communications performance. Thereafter, observing the security-reliability performance tradeoff of the downlink ISAMC, we conduct closed-form analyses to compare COPs of round-robin scheduling(RS) and multiuser scheduling(MS) with the aid of a TS-based STAR-FC-RIS. Furthermore, we derive closed-form expressions of the sensing outage probability, communications outage probability(COP), and communications intercept probability, where an average of the three probabilities is exploited to obtain an optimized time allocation(OTA) of the *** results verify that the STAR-FCR-MS scheme outperforms the STAR-FCR-RS scheme in terms of sensing reliability and communications security. Moreover, an OTA remarkably enhances the overall performance of the STAR-FCR schemes of ISAMC systems.
暂无评论