Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)ma...
详细信息
Effective user authentication is key to ensuring equipment security,data privacy,and personalized services in Internet of Things(IoT)***,conventional mode-based authentication methods(e.g.,passwords and smart cards)may be vulnerable to a broad range of attacks(e.g.,eavesdropping and side-channel attacks).Hence,there have been attempts to design biometric-based authentication solutions,which rely on physiological and behavioral *** characteristics need continuous monitoring and specific environmental settings,which can be challenging to implement in ***,we can also leverage Artificial Intelligence(AI)in the extraction and classification of physiological characteristics from IoT devices processing to facilitate ***,we review the literature on the use of AI in physiological characteristics recognition pub-lished after *** use the three-layer architecture of the IoT(i.e.,sensing layer,feature layer,and algorithm layer)to guide the discussion of existing approaches and their *** also identify a number of future research opportunities,which will hopefully guide the design of next generation solutions.
The IEEE 802.15.4 standard is designed for low-rate wireless personal area networks (LR-WPANs). Deterministic and Synchronous Multi-channel Extension (DSME) is one of the key Medium Access Control (MAC) modes of the I...
详细信息
Indoor positioning is a significant and intriguing topic in navigation systems that present numerous use cases for investigation. Researchers are exploring technologies capable of providing accurate locations in indoo...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protecti...
详细信息
With the development of hardware devices and the upgrading of smartphones,a large number of users save privacy-related information in mobile devices,mainly smartphones,which puts forward higher demands on the protection of mobile users’privacy *** present,mobile user authenticationmethods based on humancomputer interaction have been extensively studied due to their advantages of high precision and non-perception,but there are still shortcomings such as low data collection efficiency,untrustworthy participating nodes,and lack of *** this end,this paper proposes a privacy-enhanced mobile user authentication method with motion sensors,which mainly includes:(1)Construct a smart contract-based private chain and federated learning to improve the data collection efficiency of mobile user authentication,reduce the probability of the model being bypassed by attackers,and reduce the overhead of data centralized processing and the risk of privacy leakage;(2)Use certificateless encryption to realize the authentication of the device to ensure the credibility of the client nodes participating in the calculation;(3)Combine Variational Mode Decomposition(VMD)and Long Short-TermMemory(LSTM)to analyze and model the motion sensor data of mobile devices to improve the accuracy of model *** experimental results on the real environment dataset of 1513 people show that themethod proposed in this paper can effectively resist poisoning attacks while ensuring the accuracy and efficiency of mobile user authentication.
Foundation models are rapidly improving the capability of robots in performing everyday tasks autonomously such as meal preparation, yet robots will still need to be instructed by humans due to model performance, the ...
详细信息
India, whose population growth is its greatest asset cannot afford to let its people eat confectionery that is either tainted or somehow polluted, since this would lead to extensive malnutrition. Traditional food supp...
详细信息
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,toke...
详细信息
Blockchain platform Ethereum has involved millions of accounts due to its strong potential for providing numerous services based on smart *** massive accounts can be divided into diverse categories,such as miners,tokens,and exchanges,which is termed as account diversity in this *** benefit of investigating diversity are multi-fold,including understanding the Ethereum ecosystem deeper and opening the possibility of tracking certain abnormal ***,the exploration of blockchain account diversity remains *** the most relevant studies,which focus on the deanonymization of the accounts on Bitcoin,can hardly be applied on Ethereum since their underlying protocols and user idioms are *** this end,we present the first attempt to demystify the account diversity on *** key observation is that different accounts exhibit diverse behavior patterns,leading us to propose the heuristics for classification as the *** then raise the coverage rate of classification by the statistical learning model Maximum Likelihood Estimation(MLE).We collect real-world data through extensive efforts to evaluate our proposed method and show its ***,we make an in-depth analysis of the dynamic evolution of the Ethereum ecosystem and uncover the abnormal arbitrage *** for the former,we validate two sweeping statements reliably:(1)standalone miners are gradually replaced by the mining pools and cooperative miners;(2)transactions related to the mining pool and exchanges take up a large share of the total *** latter analysis shows that there are a large number of arbitrage transactions transferring the coins from one exchange to another to make a price difference.
Group Fairness-aware Continual Learning (GFCL) aims to eradicate discriminatory predictions against certain demographic groups in a sequence of diverse learning tasks. This paper explores an even more challenging GFCL...
详细信息
automating decision-making on a wide range of aspects are affecting humanity. There is great promise in machine learning (ML) and artificial intelligence (AI) algorithms for assisting with predicted and automated deci...
automating decision-making on a wide range of aspects are affecting humanity. There is great promise in machine learning (ML) and artificial intelligence (AI) algorithms for assisting with predicted and automated decision-making and transforming both societies and industries to improve African citizens' everyday lives. In a business context, platforms such as cloud computing can benefit a lot from AI and ML. Prediction models could be developed to predict the traffic flow of cloud computing resources, which could ease traffic flow. Although AI and ML cloud computing are powerful and vital, they are unfortunately not immune from ethical challenges. As well as improving the allocation of cloud computing resources with prediction models. In recent years, despite AI’s powerful performance, in order to conduct responsible AI and ML modeling, it is important not to ignore ethical issues that might need serious investigation, particularly if human and classified data are concerned. In this regard, the objective of this paper is to determine the prevalence of AI and ML ethics research in Africa. In this paper, RStudio and the computing-related databases (IEEE Xplore, Web of service and Scopus) were used to conduct a bibliometric analysis on the prevalence of AI and ML ethics that relate to the cloud computing environment. The scope was minimized due to its prevalence in the African context. The findings show that AI and ML ethics are understudied on the African continent compared to the West. In this regard, there is a need to conduct more AI and ML ethics-related research in Africa because failure to do so will result in the West shaping the ethical discussion in areas of importance for African development, such as cloud computing. The latter will allow the West to slowly impose its perspective without considering African perspectives. Of note, this paper contributes to the doctoral study with an objective phrased as "to conduct bibliometric analysis to identify the preval
Recent advances in Large Language Models (LLMs) have demonstrated significant potential in the field of Recommendation systems (RSs). Most existing studies have focused on converting user behavior logs into textual pr...
暂无评论