Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is t...
详细信息
Cyber security is dynamic as defenders often need to adapt their defense postures. The state-ofthe-art is that the adaptation of network defense is done manually(i.e., tedious and error-prone). The ideal solution is to automate adaptive network defense, which is however a difficult problem. As a first step towards automation, we propose investigating how to attain semi-automated adaptive network defense(SAND). We propose an approach extending the architecture of software-defined networking, which is centered on providing defenders with the capability to program the generation and deployment of dynamic defense rules enforced by network defense tools. We present the design and implementation of SAND, as well as the evaluation of the prototype implementation. Experimental results show that SAND can achieve agile and effective dynamic adaptations of defense rules(less than 15 ms on average for each operation), while only incurring a small performance overhead.
Learning from Demonstration (LfD) stands out as a powerful tool for swiftly deploying tasks in robotics, distinguished by its capacity to effectively leverage the task expertise of experts. However, contemporary robot...
详细信息
Distinguishing the breeds of animals is one of the major examination areas in animal welfare. Recognition of animal breeds demands numerous determining elements which are necessary to be explored and following classif...
详细信息
Designer chromosomes are artificially synthesized ***,these chromosomes have numerous applications ranging from medical research to the development of ***,some chromosome fragments can interfere with the chemical synt...
详细信息
Designer chromosomes are artificially synthesized ***,these chromosomes have numerous applications ranging from medical research to the development of ***,some chromosome fragments can interfere with the chemical synthesis of designer chromosomes and eventually limit the widespread use of this *** address this issue,this study aimed to develop an interpretable machine learning framework to predict and quantify the synthesis difficulties of designer chromosomes in *** the use of this framework,six key sequence features leading to synthesis difficulties were identified,and an e Xtreme Gradient Boosting model was established to integrate these *** predictive model achieved high-quality performance with an AUC of 0.895 in cross-validation and an AUC of 0.885 on an independent test *** on these results,the synthesis difficulty index(S-index)was proposed as a means of scoring and interpreting synthesis difficulties of chromosomes from prokaryotes to *** findings of this study emphasize the significant variability in synthesis difficulties between chromosomes and demonstrate the potential of the proposed model to predict and mitigate these difficulties through the optimization of the synthesis process and genome rewriting.
This paper introduces a complete method for bearing fault detection. By analyzing the vibration signal when a fault occurs, the type of fault can be detected. The number of high-frequency intrinsic mode functions (IMF...
详细信息
Crime hotspot detection is essential for law enforcement agencies to allocate resources effectively,predict potential criminal activities,and ensure public *** methods of crime analysis often rely on manual,time-consu...
详细信息
Crime hotspot detection is essential for law enforcement agencies to allocate resources effectively,predict potential criminal activities,and ensure public *** methods of crime analysis often rely on manual,time-consuming processes that may overlook intricate patterns and correlations within the *** some existing machine learning models have improved the efficiency and accuracy of crime prediction,they often face limitations such as overfitting,imbalanced datasets,and inadequate handling of spatiotemporal *** research proposes an advanced machine learning framework,CHART(Crime Hotspot Analysis and Real-time Tracking),designed to overcome these *** proposed methodology begins with comprehensive data collection from the police *** dataset includes detailed attributes such as crime type,location,time and demographic *** key steps in the proposed framework include:Data Preprocessing,Feature engineering that leveraging domain-specific knowledge to extract and transform relevant *** Map Generation that employs Kernel Density Estimation(KDE)to create visual representations of crime density,highlighting hotspots through smooth data point distributions and Hotspot Detection based on Random Forest-based to predict crime likelihood in various *** Experimental evaluation demonstrated that CHART shows superior performance over benchmark methods,significantly improving crime detection accuracy by getting 95.24%for crime detection-I(CD-I),96.12%for crime detection-II(CD-II)and 94.68%for crime detection-III(CD-III),*** designing the application with integrating sophisticated preprocessing techniques,balanced data representation,and advanced feature engineering,the proposed model provides a reliable and practical tool for real-world crime *** of crime hotspots enables law enforcement agencies to strategize effectively,focusing resources on high-risk areas and thereby enhanc
Solar energy is one of the most abundant sources of renewable energy in Indonesia. Solar energy is now typically harnessed using solar panels, but the low efficiency of photovoltaic cells requires the development of o...
详细信息
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these paramete...
详细信息
Support Vector Machine(SVM)has become one of the traditional machine learning algorithms the most used in prediction and classification ***,its behavior strongly depends on some parameters,making tuning these parameters a sensitive step to maintain a good *** the other hand,and as any other classifier,the performance of SVM is also affected by the input set of features used to build the learning model,which makes the selection of relevant features an important task not only to preserve a good classification accuracy but also to reduce the dimensionality of *** this paper,the MRFO+SVM algorithm is introduced by investigating the recent manta ray foraging optimizer to fine-tune the SVM parameters and identify the optimal feature subset *** proposed approach is validated and compared with four SVM-based algorithms over eight benchmarking ***,it is applied to a disease Covid-19 *** experimental results show the high ability of the proposed algorithm to find the appropriate SVM’s parameters,and its acceptable performance to deal with feature selection problem.
The famous zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARK) was proposed by Groth in ***, the construction is based on quadratic arithmetic programs which are highly efficient concerning the pr...
详细信息
The famous zero-knowledge succinct non-interactive arguments of knowledge(zk-SNARK) was proposed by Groth in ***, the construction is based on quadratic arithmetic programs which are highly efficient concerning the proof length and the verification complexity. Since then, there has been much progress in designing zk-SNARKs, achieving stronger security,and simulated extractability, which is analogous to non-malleability and has broad applications. In this study, following Groth's pairing-based zk-SNARK, a simulation extractability zk-SNARK under the random oracle model is constructed. Our construction relies on a newly proposed property named target linearly collision-resistant, which is satisfied by random oracles under discrete logarithm assumptions. Compared to the original Groth16 zk-SNARK, in our construction, both parties are allowed to use such a random oracle, aiming to get the same random number. The resulting proof consists of 3 group elements and only 1 pairing equation needs to be verified. Compared to other related works, our construction is shorter in proof length and simpler in verification while preserving simulation extractability. The results also extend to achieve subversion zero-knowledge SNARKs.
In the past few decades, the demand for assistive robots in the field of healthcare has steadily increased. We conducted research on an autonomous robot system based on imitation learning to assist in liver scans guid...
详细信息
暂无评论