In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic de...
详细信息
In Internet of Things(loT),data sharing among different devices can improve manufacture efficiency and reduce workload,and yet make the network systems be more vulnerable to various intrusion *** has been realistic demand to develop an efficient intrusion detection algorithm for connected *** of existing intrusion detection methods are trained in a centralized manner and are incapable to identify new unlabeled attack *** this paper,a distributed federated intrusion detection method is proposed,utilizing the information contained in the labeled data as the prior knowledge to discover new unlabeled attack ***,the blockchain technique is introduced in the federated learning process for the consensus of the entire *** results are provided to show that our approach can identify the malicious entities,while outperforming the existing methods in discovering new intrusion attack types.
1 Introduction Graphical User Interface(GUI)widgets classification entails classifying widgets into their appropriate domain-specific types(e.g.,CheckBox and EditText)[1,2].The widgets classification is essential as i...
详细信息
1 Introduction Graphical User Interface(GUI)widgets classification entails classifying widgets into their appropriate domain-specific types(e.g.,CheckBox and EditText)[1,2].The widgets classification is essential as it supports several software engineering tasks,such as GUI design and testing[1,3].The ability to obtain better widget classification performance has become one of the keys to the success of these *** in recent years have proposed many techniques for improving widget classification performance[1,2,4].For example,Moran et al.[1]proposed a deep learning technique to classify GUI widgets into their domain-specific *** authors used the deep learning algorithm,a Convolutional Neural Network(CNN)architecture,to classify the GUI *** et al.[2]proposed combining text-based and non-text-based models to improve the overall performance of GUI widget detection while classifying the widgets with the ResNet50 model.
The power spectra estimated from the brain recordings are the mixed representation of aperiodic transient activity and periodic oscillations, i.e., aperiodic component (AC) and periodic component (PC). Quantitative ne...
详细信息
Vision-based depression estimation is an emerging yet impactful task, whose challenge lies in predicting the severity of depression from facial videos lasting at least several minutes. Existing methods primarily focus...
详细信息
JPEG reversible data hiding (RDH) refers to covert communication technology to accurately extract secret data while also perfectly recovering the original JPEG image. With the development of cloud services, a large nu...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a uni...
详细信息
Offensive messages on social media,have recently been frequently used to harass and criticize *** recent studies,many promising algorithms have been developed to identify offensive *** algorithms analyze text in a unidirectional manner,where a bidirectional method can maximize performance results and capture semantic and contextual information in *** addition,there are many separate models for identifying offensive texts based on monolin-gual and multilingual,but there are a few models that can detect both monolingual and multilingual-based offensive *** this study,a detection system has been developed for both monolingual and multilingual offensive texts by combining deep convolutional neural network and bidirectional encoder representations from transformers(Deep-BERT)to identify offensive posts on social media that are used to harass *** paper explores a variety of ways to deal with multilin-gualism,including collaborative multilingual and translation-based ***,the Deep-BERT is tested on the Bengali and English datasets,including the different bidirectional encoder representations from transformers(BERT)pre-trained word-embedding techniques,and found that the proposed Deep-BERT’s efficacy outperformed all existing offensive text classification algorithms reaching an accuracy of 91.83%.The proposed model is a state-of-the-art model that can classify both monolingual-based and multilingual-based offensive texts.
Traffic conflict techniques rely heavily on the proper identification of conflict extremes,which directly affects the prediction performance of extreme value *** sampling techniques,namely,block maxima and peak over t...
详细信息
Traffic conflict techniques rely heavily on the proper identification of conflict extremes,which directly affects the prediction performance of extreme value *** sampling techniques,namely,block maxima and peak over threshold,form the core of these *** studies have demonstrated the inefficacy of extreme value models based on these sampling approaches,as their crash estimates are too imprecise,hindering their widespread practical ***,anomaly detection techniques for sampling conflict extremes have been used,but their application has been limited to estimating crash frequency without considering the crash severity *** address this research gap,this study proposes a hybrid model of machine learning and extreme value theory within a bivariate framework of traffic conflict measures to estimate crash frequency by severity *** particular,modified time-to-collision(MTTC)and expected post-collision change in velocity(Delta-V orΔV)have been proposed in the hybrid modeling framework to estimate rear-end crash frequency by severity ***-end conflicts were identified through artificial intelligence-based video analytics for three four-legged signalized intersections in Brisbane,Australia,using four days of ***-stationary bivariate hybrid generalized extreme value models with different anomaly detection/sampling techniques(isolation forest and minimum covariance determinant)were *** non-stationarity of traffic conflict extremes was handled by parameterizing model parameters,including location,scale,and both location and scale parameters *** results indicate that the bivariate hybrid models can estimate severe and non-severe crashes when compared with historical crash records,thereby demonstrating the viability of the proposed approach.A comparative analysis of two anomaly techniques reveals that the isolation forest model marginally outperforms the minimum covariance determinant ***,the modeling f
Drunk-driving is an important factor causing road traffic accidents and deaths, which deserves a lot of research. However, most current methods for detecting drunk-driving depend on customized hardware or require user...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security desig...
详细信息
Border Gateway Protocol(BGP)is a standard inter-domain routing protocol for the Internet that conveys network layer reachability information and establishes routes to different *** BGP protocol exhibits security design defects,such as an unconditional trust mechanism and the default acceptance of BGP route announcements from peers by BGP neighboring nodes,easily triggering prefix hijacking,path forgery,route leakage,and other BGP security ***,the traditional BGP security mechanism,relying on a public key infrastructure,faces issues like a single point of failure and a single point of *** decentralization,anti-tampering,and traceability advantages of blockchain offer new solution ideas for constructing secure and trusted inter-domain routing *** this paper,we summarize the characteristics of BGP protocol in detail,sort out the BGP security threats and their ***,we analyze the shortcomings of the traditional BGP security mechanism and comprehensively evaluate existing blockchain-based solutions to address the above problems and validate the reliability and effectiveness of blockchain-based BGP security methods in mitigating BGP security ***,we discuss the challenges posed by BGP security problems and outline prospects for future research.
The daily task planning problem (DTPP) in the ground control of satellites has been a significant focus for space scientists. Although various optimization methods have been devoted to solving this problem, most of th...
暂无评论