With extensive research and development in blockchain technology, the concern about scalability, security, and decentralization is still evident. Blockchain trilemma describes that it is realistically impossible to si...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only address...
详细信息
In the context of an increasingly severe cybersecurity landscape and the growing complexity of offensive and defen-sive techniques,Zero Trust Networks(ZTN)have emerged as a widely recognized *** Trust not only addresses the shortcomings of traditional perimeter security models but also consistently follows the fundamental principle of“never trust,always verify.”Initially proposed by John Cortez in 2010 and subsequently promoted by Google,the Zero Trust model has become a key approach to addressing the ever-growing security threats in complex network *** paper systematically compares the current mainstream cybersecurity models,thoroughly explores the advantages and limitations of the Zero Trust model,and provides an in-depth review of its components and key ***,it analyzes the latest research achievements in the application of Zero Trust technology across various fields,including network security,6G networks,the Internet of Things(IoT),and cloud computing,in the context of specific use *** paper also discusses the innovative contributions of the Zero Trust model in these fields,the challenges it faces,and proposes corresponding solutions and future research directions.
Virtual Reality (VR) and Augmented Reality (AR) have witnessed a surge in popularity, revolutionizing various industries and enhancing user experiences. As these technologies continue to evolve, ensuring secure user i...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information...
详细信息
Algorithms for steganography are methods of hiding data transfers in media *** machine learning architectures have been presented recently to improve stego image identification performance by using spatial information,and these methods have made it feasible to handle a wide range of problems associated with image *** with little information or low payload are used by information embedding methods,but the goal of all contemporary research is to employ high-payload images for *** address the need for both low-and high-payload images,this work provides a machine-learning approach to steganography image classification that uses Curvelet transformation to efficiently extract characteristics from both type of *** Vector Machine(SVM),a commonplace classification technique,has been employed to determine whether the image is a stego or *** Wavelet Obtained Weights(WOW),Spatial Universal Wavelet Relative Distortion(S-UNIWARD),Highly Undetectable Steganography(HUGO),and Minimizing the Power of Optimal Detector(MiPOD)steganography techniques are used in a variety of experimental scenarios to evaluate the performance of the *** WOW at several payloads,the proposed approach proves its classification accuracy of 98.60%.It exhibits its superiority over SOTA methods.
The growing use of digital media or social media has given a platform to the people to deliver their ideas and viewpoints openly. It is facilitating the rapid spread of contrasting opinions openly. Ultimately, this ha...
详细信息
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL mode...
详细信息
Recent achievements in deep learning(DL)have demonstrated its potential in predicting traffic *** predictions are beneficial for understanding the situation and making traffic control ***,most state-of-the-art DL models are consi-dered“black boxes”with little to no transparency of the underlying mechanisms for end *** previous studies attempted to“open the black box”and increase the interpretability of generated ***,handling complex models on large-scale spatiotemporal data and discovering salient spatial and temporal patterns that significantly influence traffic flow remain *** overcome these challenges,we present TrafPS,a visual analytics approach for interpreting traffic prediction outcomes to support decision-making in traffic management and urban *** measurements region SHAP and trajectory SHAP are proposed to quantify the impact of flow patterns on urban traffic at different *** on the task requirements from domain experts,we employed an interactive visual interface for the multi-aspect exploration and analysis of significant flow *** real-world case studies demonstrate the effectiveness of TrafPS in identifying key routes and providing decision-making support for urban planning.
Prior research in video object segmentation (VOS) predominantly relies on videos with dense annotations. However, obtaining pixel-level annotations is both costly and time-intensive. In this work, we highlight the pot...
详细信息
Federated Learning (FL) offers significant advancements in user/data privacy, learning quality, model efficiency, scalability, and network communication latency. However, it faces notable security challenges, particul...
详细信息
In this study,twelve machine learning(ML)techniques are used to accurately estimate the safety factor of rock slopes(SFRS).The dataset used for developing these models consists of 344 rock slopes from various open-pit...
详细信息
In this study,twelve machine learning(ML)techniques are used to accurately estimate the safety factor of rock slopes(SFRS).The dataset used for developing these models consists of 344 rock slopes from various open-pit mines around Iran,evenly distributed between the training(80%)and testing(20%)*** models are evaluated for accuracy using Janbu's limit equilibrium method(LEM)and commercial tool GeoStudio *** assessment metrics show that the random forest model is the most accurate in estimating the SFRS(MSE=0.0182,R2=0.8319)and shows high agreement with the results from the LEM *** results from the long-short-term memory(LSTM)model are the least accurate(MSE=0.037,R2=0.6618)of all the models ***,only the null space support vector regression(NuSVR)model performs accurately compared to the practice mode by altering the value of one parameter while maintaining the other parameters *** is suggested that this model would be the best one to use to calculate the SFRS.A graphical user interface for the proposed models is developed to further assist in the calculation of the SFRS for engineering *** this study,we attempt to bridge the gap between modern slope stability evaluation techniques and more conventional analysis methods.
This paper presents an intelligent waste sorting system that utilizes computer vision and deep learning to accurately categorize waste items. Moreover, the system incentivizes proper waste disposal through a rewards s...
详细信息
暂无评论