With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based *** this dynamic m...
详细信息
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based *** this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication ***,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the *** address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is *** protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session *** security of these session keys is rigorously validated through formal proofs,formal verification,and informal *** confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)*** proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C *** simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstructi...
详细信息
Time series anomaly detection is crucial in various industrial applications to identify unusual behaviors within the time series *** to the challenges associated with annotating anomaly events,time series reconstruction has become a prevalent approach for unsupervised anomaly ***,effectively learning representations and achieving accurate detection results remain challenging due to the intricate temporal patterns and dependencies in real-world time *** this paper,we propose a cross-dimension attentive feature fusion network for time series anomaly detection,referred to as ***,a series and feature mixing block is introduced to learn representations in 1D ***,a fast Fourier transform is employed to convert the time series into 2D space,providing the capability for 2D feature ***,a cross-dimension attentive feature fusion mechanism is designed that adaptively integrates features across different dimensions for anomaly *** results on real-world time series datasets demonstrate that CAFFN performs better than other competing methods in time series anomaly detection.
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the g...
详细信息
1 Introduction In recent years,the Massively Parallel Computation(MPC)model has gained significant ***,most of distributed and parallel graph algorithms in the MPC model are designed for static graphs[1].In fact,the graphs in the real world are constantly *** size of the real-time changes in these graphs is smaller and more *** graph algorithms[2,3]can deal with graph changes more efficiently[4]than the corresponding static graph ***,most studies on dynamic graph algorithms are limited to the single machine ***,a few parallel dynamic graph algorithms(such as the graph connectivity)in the MPC model[5]have been proposed and shown superiority over their parallel static counterparts.
With the increasing pervasiveness of mobile devices such as smartphones,smart TVs,and wearables,smart sensing,transforming the physical world into digital information based on various sensing medias,has drawn research...
详细信息
With the increasing pervasiveness of mobile devices such as smartphones,smart TVs,and wearables,smart sensing,transforming the physical world into digital information based on various sensing medias,has drawn researchers’great *** different sensing medias,WiFi and acoustic signals stand out due to their ubiquity and zero hardware *** on different basic principles,researchers have proposed different technologies for sensing applications with WiFi and acoustic signals covering human activity recognition,motion tracking,indoor localization,health monitoring,and the *** enable readers to get a comprehensive understanding of ubiquitous wireless sensing,we conduct a survey of existing work to introduce their underlying principles,proposed technologies,and practical *** we also discuss some open issues of this research *** survey reals that as a promising research direction,WiFi and acoustic sensing technologies can bring about fancy applications,but still have limitations in hardware restriction,robustness,and applicability.
At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomp...
At present, an increasing number of researchers have noticed the importance of optimal consensus control(OCC) of multiagent systems(MASs) because of their rich practical applications in various areas [1–4]. To accomplish OCC,
Current work on Chinese medical name entity recognition focuses on extracting flattened entities, and when there are nested entities in the entities, the entity recognition is prone to errors and cannot accurately ide...
详细信息
Infrared unmanned aerial vehicle(UAV)target detection presents significant challenges due to the inter-play between small targets and complex *** methods,while effective in controlled environments,often fail in scenar...
详细信息
Infrared unmanned aerial vehicle(UAV)target detection presents significant challenges due to the inter-play between small targets and complex *** methods,while effective in controlled environments,often fail in scenarios involving long-range targets,high noise levels,or intricate backgrounds,highlighting the need for more robust *** address these challenges,we propose a novel three-stage UAV segmentation framework that leverages uncertainty quantification to enhance target *** framework incorporates a Bayesian convolutional neural network capable of generating both segmentation maps and probabilistic uncertainty *** utilizing uncer-tainty predictions,our method refines segmentation outcomes,achieving superior detection ***,this marks the first application of uncertainty modeling within the context of infrared UAV target *** evaluations on three publicly available infrared UAV datasets demonstrate the effectiveness of the proposed *** results reveal significant improvements in both detection precision and robustness when compared to state-of-the-art deep learning *** approach also extends the capabilities of encoder-decoder convolutional neural networks by introducing uncertainty modeling,enabling the network to better handle the challenges posed by small targets and complex environmental *** bridging the gap between theoretical uncertainty modeling and practical detection tasks,our work offers a new perspective on enhancing model interpretability and *** codes of this work are available openly at https://***/general-learner/UQ_Anti_UAV(acceessed on 11 November 2024).
In edge computing, the Zero-Trust Security Model (ZTSM), as a key enabling technology for next-generation networks, plays a crucial role in providing authentication for addressing data sharing concerns, such as freque...
详细信息
With the expansion of IoT application scenarios, the demand for edge IoT devices with integrated video analysis capabilities is gradually increasing. In remote areas where cellular base stations cannot reach, a low-co...
详细信息
The number of Internet of Things (IoT) devices in the world has grown to 43 billion in 2023. With the expansion of the IoT industry, the types and communication protocols of IoT devices are also increasing. In the act...
详细信息
暂无评论