Graph-based fraud detection has attracted increasing attention in recent years, reflecting its growing potential in mitigating sophisticated fraudulent activities. The main objective of graph-based fraud detection is ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly ...
详细信息
Due to their low power consumption and limited computing power,Internet of Things(IoT)devices are difficult to ***,the rapid growth of IoT devices in homes increases the risk of *** detection systems(IDS)are commonly employed to prevent *** systems detect incoming attacks and instantly notify users to allow for the implementation of appropriate *** have been made in the past to detect new attacks using machine learning and deep learning techniques,however,these efforts have been *** this paper,we propose two deep learning models to automatically detect various types of intrusion attacks in IoT ***,we experimentally evaluate the use of two Convolutional Neural Networks(CNN)to detect nine distinct types of attacks listed in the NF-UNSW-NB15-v2 *** accomplish this goal,the network stream data were initially converted to twodimensional images,which were then used to train the neural network *** also propose two baseline models to demonstrate the performance of the proposed ***,both models achieve high accuracy in detecting the majority of these nine attacks.
Women all across the world are affected by the potentially fatal condition known as breast cancer. According to clinical experts, early cancer detection helps to save lives. Several machine learning algorithms have be...
详细信息
Predicting stock prices is a complex and challenging task in financial markets due to the intricate and non-linear nature of stock price movements. This study explores the application of Coordinate Attention mechanism...
详细信息
The key-value separation is renowned for its significant mitigation of the write amplification inherent in traditional LSM trees. However, KV separation potentially increases performance overhead in the management of ...
详细信息
COVID-19 is a ribonucleic acid virus with a high mutation frequency and will continue to mutate as time goes on. At the same time, the number of antibodies in the human body will gradually decrease with time. This pap...
详细信息
Test-time compute is emerging as a new paradigm for enhancing language models’ complex multi-step reasoning capabilities, as demonstrated by the success of OpenAI’s o1 and o3, as well as DeepSeek’s R1. Compared to ...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions cal...
详细信息
Sharding is a promising technique to tackle the critical weakness of scalability in blockchain-based unmanned aerial vehicle(UAV)search and rescue(SAR)*** breaking up the blockchain network into smaller partitions called shards that run independently and in parallel,shardingbased UAV systems can support a large number of search and rescue UAVs with improved scalability,thereby enhancing the rescue ***,the lack of adaptability and interoperability still hinder the application of sharded blockchain in UAV SAR *** refers to making adjustments to the blockchain towards real-time surrounding situations,while interoperability refers to making cross-shard interactions at the mission *** address the above challenges,we propose a blockchain UAV system for SAR missions based on dynamic sharding *** from the benefits in scalability brought by sharding,our system improves adaptability by dynamically creating configurable and mission-exclusive shards,and improves interoperability by supporting calls between smart contracts that are deployed on different *** implement a prototype of our system based on Quorum,give an analysis of the improved adaptability and interoperability,and conduct experiments to evaluate the *** results show our system can achieve the above goals and overcome the weakness of blockchain-based UAV systems in SAR scenarios.
With many online recruitment portals requesting job applicants to upload their resumes, the automated process of screening and shortlisting candidates can accelerate selection and decision-making. This study explores ...
详细信息
Email threat is a serious issue for enterprise security. The threat can be in various malicious forms, such as phishing, fraud, blackmail and malvertisement. The traditional anti-spam gateway often maintains a greylis...
详细信息
暂无评论