In the realm of agriculture, soybeans have played a vital role in diets for centuries, providing a consistent source of plant protein. Beyond protein, soybeans offer essential components like fibres, vitamins (includi...
详细信息
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human ***,using machine learning in intelligent networks also pr...
详细信息
Over the past years,the emergence of intelligent networks empowered by machine learning techniques has brought great facilitates to different aspects of human ***,using machine learning in intelligent networks also presents potential security and privacy threats.A common practice is the so-called poisoning attacks where malicious users inject fake training data with the aim of corrupting the learned *** this survey,we comprehensively review existing poisoning attacks as well as the countermeasures in intelligent networks for the first *** emphasize and compare the principles of the formal poisoning attacks employed in different categories of learning algorithms,and analyze the strengths and limitations of corresponding defense methods in a compact *** also highlight some remaining challenges and future directions in the attack-defense confrontation to promote further research in this emerging yet promising area.
Due to their flexible and lightweight nature, unmanned aerial vehicles (UAVs) find extensive application in cooperative navigation and positioning technology. Additionally, wireless sensor networks (WSNs) serve as a c...
详细信息
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such...
详细信息
The unmanned aerial vehicle(UAV)self-organizing network is composed of multiple UAVs with autonomous capabilities according to a certain structure and scale,which can quickly and accurately complete complex tasks such as path planning,situational awareness,and information *** to the openness of the network,the UAV cluster is more vulnerable to passive eavesdropping,active interference,and other attacks,which makes the system face serious security *** paper proposes a Blockchain-Based Data Acquisition(BDA)scheme with privacy protection to address the data privacy and identity authentication problems in the UAV-assisted data acquisition *** UAV cluster has an aggregate unmanned aerial vehicle(AGV)that can batch-verify the acquisition reports within its administrative *** successful verification,AGV adds its signcrypted ciphertext to the aggregation and uploads it to the blockchain for *** are two chains in the blockchain that store the public key information of registered entities and the aggregated reports,*** security analysis shows that theBDAconstruction can protect the privacy and authenticity of acquisition data,and effectively resist a malicious key generation center and the public-key substitution *** also provides unforgeability to acquisition reports under the Elliptic Curve Discrete Logarithm Problem(ECDLP)*** performance analysis demonstrates that compared with other schemes,the proposed BDA construction has lower computational complexity and is more suitable for the UAV cluster network with limited computing power and storage capacity.
To ensure driving safety, radar detection is an essential function of autonomous vehicle. However, with the increasing number of automotive radars and limited spectrum resources, the co-channel interference among rada...
详细信息
In the face of increasing two-wheeler usage and the persistent issue of riders neglecting helmet compliance, this paper proposes a groundbreaking Real-Time Helmet Detection System with Vehicle Number Extraction. The e...
详细信息
Genomic data analysis is of utmost importance in the healthcare sector as it seeks to solve the main problem of detection and genetic disease forecasting. This thesis surveys the utilization of sophisticated machine l...
详细信息
Low-earth-orbit(LEO) satellite can ensure the acquisition of external timing and positioning for UAVs in Global Navigation Satellite System(GNSS) -denied environments. This paper proposes a multi-source information fu...
详细信息
At times, the interfaces of videogames - gameworlds - contain tiny details that go unnoticed. One such detail is how designers employ ! and ? to communicate to players. These punctuation marks have existed in videogam...
详细信息
Federated Learning (FL) is a distributed machine learning technique where multiple devices (such as smartphones or IoT devices) train a shared global model by using their local data. FL promises better data privacy as...
详细信息
暂无评论