The existing cloud model unable to handle abundant amount of Internet of Things (IoT) services placed by the end users due to its far distant location from end user and centralized nature. The edge and fog computing a...
详细信息
One of the leading causes of early health detriment is the increasing levels of air pollution in major cities and eventually in indoor spaces. Monitoring the air quality effectively in closed spaces like educational i...
详细信息
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-dr...
详细信息
As the device complexity keeps increasing,the blockchain networks have been celebrated as the cornerstone of numerous prominent platforms owing to their ability to provide distributed and immutable ledgers and data-driven autonomous *** distributed consensus algorithm is the core component that directly dictates the performance and properties of blockchain ***,the inherent characteristics of the shared wireless medium,such as fading,interference,and openness,pose significant challenges to achieving consensus within these networks,especially in the presence of malicious jamming *** cope with the severe consensus problem,in this paper,we present a distributed jamming-resilient consensus algorithm for blockchain networks in wireless environments,where the adversary can jam the communication channel by injecting jamming *** on a non-binary slight jamming model,we propose a distributed four-stage algorithm to achieve consensus in the wireless blockchain network,including leader election,leader broadcast,leader aggregation,and leader announcement *** high probability,we prove that our jamming-resilient algorithm can ensure the validity,agreement,termination,and total order properties of consensus with the time complexity of O(n).Both theoretical analyses and empirical simulations are conducted to verify the consistency and efficiency of our algorithm.
Database watermarking technologies provide an effective solution to data security problems by embedding the watermark in the database to prove copyright or trace the source of data ***,when the watermarked database is...
详细信息
Database watermarking technologies provide an effective solution to data security problems by embedding the watermark in the database to prove copyright or trace the source of data ***,when the watermarked database is used for data mining model building,such as decision trees,it may cause a different mining result in comparison with the result from the original database caused by the distortion of watermark *** watermarking algorithms mainly consider the statistical distortion of data,such as the mean square error,but very few consider the effect of the watermark on database ***,in this paper,a consistency preserving database watermarking algorithm is proposed for decision ***,label classification statistics and label state transfer methods are proposed to adjust the watermarked data so that the model structure of the watermarked decision tree is the same as that of the original decision ***,the splitting values of the decision tree are adjusted according to the defined constraint ***,the adjusted database can obtain a decision tree consistent with the original decision *** experimental results demonstrated that the proposed algorithm does not corrupt the watermarks,and makes the watermarked decision tree consistent with the original decision tree with a small distortion.
Insights derived out of image captioning systems have potential applications in real life, including providing auditory assistance for the visually impaired. This paper proposes TransEffiVisNet, a novel image captioni...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids i...
详细信息
Due to the dynamic nature and node mobility,assuring the security of Mobile Ad-hoc Networks(MANET)is one of the difficult and challenging tasks *** MANET,the Intrusion Detection System(IDS)is crucial because it aids in the identification and detection of malicious attacks that impair the network’s regular *** machine learning and deep learning methodologies are used for this purpose in the conventional works to ensure increased security of ***,it still has significant flaws,including increased algorithmic complexity,lower system performance,and a higher rate of ***,the goal of this paper is to create an intelligent IDS framework for significantly enhancing MANET security through the use of deep learning ***,the min-max normalization model is applied to preprocess the given cyber-attack datasets for normalizing the attributes or fields,which increases the overall intrusion detection performance of ***,a novel Adaptive Marine Predator Optimization Algorithm(AOMA)is implemented to choose the optimal features for improving the speed and intrusion detection performance of ***,the Deep Supervise Learning Classification(DSLC)mechanism is utilized to predict and categorize the type of intrusion based on proper learning and training *** evaluation,the performance and results of the proposed AOMA-DSLC based IDS methodology is validated and compared using various performance measures and benchmarking datasets.
Anomaly detection of sensor data is crucial to ensure the stability and effectiveness of IoT system. The task requires high accuracy and low latency, which makes distributed anomaly detection gradually become a resear...
详细信息
The Social Internet of Things (SIoT) is an innovative fusion of IoT and smart devices that enable them to establish dynamic relationships. Securing sensitive data in a smart environment requires a model to determine t...
详细信息
With the explosive growth of multimodal Internet data, cross-modal hashing retrieval has become crucial for semantically searching instances across different modalities. However, existing cross-modal retrieval methods...
详细信息
X-ray security inspection for detecting prohibited items is widely used to maintain social order and ensure the safety of people’s lives and property. Due to the large number of parameters and high computational comp...
详细信息
暂无评论