The use of management by objectives (MBOs) methodologies, particularly the objectives and key results (OKRs) framework, has gained widespread attention in recent years as a means of improving organizational performanc...
详细信息
The Traveling Salesman Problem (TSP) seeks the shortest closed tour that visits each city once and returns to the starting city. This problem is NP-hard, so it is not easy to solve using conventional methods. The grey...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***...
详细信息
The Internet of Things(loT)has grown rapidly due to artificial intelligence driven edge *** enabling many new functions,edge computing devices expand the vulnerability surface and have become the target of malware ***,attackers have used advanced techniques to evade defenses by transforming their malware into functionality-preserving *** systematically analyze such evasion attacks and conduct a large-scale empirical study in this paper to evaluate their impact on *** specifically,we focus on two forms of evasion attacks:obfuscation and adversarial *** the best of our knowledge,this paper is the first to investigate and contrast the two families of evasion attacks *** apply 10 obfuscation attacks and 9 adversarial attacks to 2870 malware *** obtained findings are as follows.(1)Commercial Off-The-Shelf(COTS)malware detectors are vulnerable to evasion attacks.(2)Adversarial attacks affect COTS malware detectors slightly more effectively than obfuscated malware examples.(3)Code similarity detection approaches can be affected by obfuscated examples and are barely affected by adversarial attacks.(4)These attacks can preserve the functionality of original malware examples.
This paper introduces an advanced road damage detection algorithm that effectively addresses the shortcomings of existing models, including limited detection performance and large parameter sizes, by utilizing the YOL...
详细信息
The paper proposed a secured and efficient data aggregation mechanism leveraging the edge computing paradigm and homomorphic data encryption technique. The paper used a unique combination of Paillier cryptosystem and ...
详细信息
Logistics supply chain (LSC), a chain structure that integrates and coordinates all logistics transactions, has become an essential component of the modern logistics industry. By using blockchain, trusted logistics se...
详细信息
This paper introduces a new network model - the Image Guidance Encoder-Decoder Model (IG-ED), designed to enhance the efficiency of image captioning and improve predictive accuracy. IG-ED, a fusion of the convolutiona...
详细信息
Diabetes retinopathy (DR) is one of the complications of diabetes. Early diagnosis of retinopathy is helpful to avoid vision loss or blindness. The difficulty of this task lies in the significant differences in the si...
详细信息
Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things(IoT).However,the p...
详细信息
Covert communication can conceal the existence of wireless transmission and thus has the ability to address information security transfer issue in many applications of the booming Internet of Things(IoT).However,the proliferation of sensing devices has generated massive amounts of data,which has increased the burden of covert *** the spatiotemporal correlation of data collection causing redundancy between data,eliminating duplicate data before transmission is beneficial for shortening transmission time,reducing the average received signal power of warden,and ultimately realizing covert *** this paper,we propose to apply delta compression technology in the gateway to reduce the amount of data generated by IoT devices,and then sent it to the cloud *** this end,a cost model and evaluation method that is closer to the actual storage mode of computer systems is been *** on which,the delta version sequence obtained by existing delta compression algorithms is no longer compact,manifested by the still high *** this situation,we designed the correction scheme based on instructions merging(CSIM)correction to save costs by merging ***,the delta version sequence is divided into five categories and corresponding merge rules were ***,for any COPY/ADD class delta compression algorithm,merge according to strict to relaxed to selection rules while generating ***,a more cost-effective delta version sequence can be *** experimental results on random data show that the delta version sequences output by the CSIM corrected 1.5-pass and greedy algorithms have better performance in cost reducing.
In several companies throughout the world, blockchain technology is gaining greater attention and implementation. In this article, first of all, we conduct an in-depth survey of blockchain technology, focusing on its ...
详细信息
暂无评论