The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such a...
详细信息
The DNS over HTTPS(Hypertext Transfer Protocol Secure)(DoH)is a new technology that encrypts DNS traffic,enhancing the privacy and security of ***,the adoption of DoH is still facing several research challenges,such as ensuring security,compatibility,standardization,performance,privacy,and increasing user *** significantly impacts network security,including better end-user privacy and security,challenges for network security professionals,increasing usage of encrypted malware communication,and difficulty adapting DNS-based security ***,it is important to understand the impact of DoH on network security and develop newprivacy-preserving techniques to allowthe analysis of DoH traffic without compromising user *** paper provides an in-depth analysis of the effects of DoH on *** discuss various techniques for detecting DoH tunneling and identify essential research challenges that need to be addressed in future security ***,this paper highlights the need for continued research and development to ensure the effectiveness of DoH as a tool for improving privacy and security.
The price of passengers is closely related to the travel cost of passengers and the revenue of driverless shared bus. Therefore, the design of pricing mechanism is important to improve the market efficiency of driverl...
详细信息
The rapid advancement of high-throughput sequencing technologies and the explosive growth of biological data have revolutionized the field of bioinformatics and biomedical computing[1-4].The generation of vast amounts...
详细信息
The rapid advancement of high-throughput sequencing technologies and the explosive growth of biological data have revolutionized the field of bioinformatics and biomedical computing[1-4].The generation of vast amounts of genomic,transcriptomic,proteomic,and metabolomic data has created unprecedented opportunities for understanding the complexities of biological systems and their implications for human health[5-6].Moreover,the emergence of spatial omics technologies,such as spatial transcriptomics and spatial proteomics,has added a new dimension to our understanding of the spatial organization and heterogeneity of biological *** cutting-edge technologies enable the mapping of molecular information at a high spatial resolution,providing valuable insights into the tissue microenvironment and the interplay between cells in various physiological and pathological conditions[7-10].
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
In the early days, it was difficult to study bio-electric signals, but now a days these problems have been solved by many hardware devices which are available at low cost. Even then there is a need for technical impro...
详细信息
Automated reading of license plate and its detection is a crucial component of the competent transportation system. Toll payment and parking management e-payment systems may benefit from this software’s features. Lic...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sen...
详细信息
Road obstacles that unexpectedly appear due to vehicle breakdowns and accidents are major causes of fatal road *** Autonomous Vehicles(CAVs)can be used to avoid collisions to ensure road safety through cooperative sensing and ***,the collision avoidance performance of CAVs with unexpected obstacles has not been studied in the existing *** this paper,we first design a platoon-based collision avoidance framework for *** this framework,we deploy a Digital Twin(DT)system at the head vehicle in a platoon to reduce communication overhead and decision-making delay based on a proposed trajectory planning *** addition,a DT-assistant system is deployed on the assistant vehicle to monitor vehicles out of the sensing range of the head vehicle for the maintenance of the DT *** this case,the transmission frequency of kinetic states of platoon members can be reduced to ensure low-overhead ***,we design a variable resource reservation interval that can ensure DT synchronization between DT and the assistant system with high *** further improve road safety,an urgency level-based trajectory planning algorithm is proposed to avoid unexpected obstacles considering different levels of emergency *** results show that our DT system-based scheme can achieve significant performance gains in unexpected obstacle *** to the existing schemes,it can reduce collisions by 95%and is faster by about 10%passing by the unexpected obstacle.
When searching for a dynamic target in an unknown real world scene,search efficiency is greatly reduced if users lack information about the spatial structure of the *** target search studies,especially in robotics,foc...
详细信息
When searching for a dynamic target in an unknown real world scene,search efficiency is greatly reduced if users lack information about the spatial structure of the *** target search studies,especially in robotics,focus on determining either the shortest path when the target’s position is known,or a strategy to find the target as quickly as possible when the target’s position is ***,the target’s position is often known intermittently in the real world,e.g.,in the case of using surveillance *** goal is to help user find a dynamic target efficiently in the real world when the target’s position is intermittently *** order to achieve this purpose,we have designed an AR guidance assistance system to provide optimal current directional guidance to users,based on searching a prediction *** assume that a certain number of depth cameras are fixed in a real scene to obtain dynamic target’s *** system automatically analyzes all possible meetings between the user and the target,and generates optimal directional guidance to help the user catch up with the target.A user study was used to evaluate our method,and its results showed that compared to free search and a top-view method,our method significantly improves target search efficiency.
The Vehicle-to-Grid (V2G) network is a smart grid technology generated under the background of the rapid development of new energy technology, which allows mobile energy storage vehicles (MESVs) to realize bidirection...
详细信息
暂无评论