Browsing Computer Science & Engineering by Title
Now showing items 1342-1361 of 2202
-
Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires ... -
Machine-to-Machine (M2M) communications: A survey
( Academic Press , 2016 , Article Review)Machine-to-Machine (M2M) communication is a promising technology for next generation communication systems. This communication paradigm facilitates ubiquitous communications with full mechanical automation, where a large ... -
Making federated learning robust to adversarial attacks by learning data and model association
( Elsevier , 2022 , Article)One of the key challenges in federated learning (FL) is the detection of malicious parameter updates. In a typical FL setup, the presence of malicious client(s) can potentially demolish the overall training of the shared ... -
Malicious mining code detection based on ensemble learning in cloud computing environment
( Elsevier B.V. , 2021 , Article)Hackers increasingly tend to abuse and nefariously use cloud services by injecting malicious mining code. This malicious code can be spread through infrastructures in the cloud platforms and pose a great threat to users ... -
A Malicious Mining Code Detection Method Based on Multi-Features Fusion
( IEEE Computer Society , 2022 , Article)With the continuous increase in the economic value of new digital currencies represented by Bitcoin, more and more cybercriminals use malicious code to occupy victims system resources and network resources for mining without ... -
Malicious uav detection using integrated audio and visual features for public safety applications
( MDPI AG , 2020 , Article)Unmanned aerial vehicles (UAVs) have become popular in surveillance, security, and remote monitoring. However, they also pose serious security threats to public privacy. The timely detection of a malicious drone is currently ... -
Malicious-proof and fair credit-based resource allocation techniques for DSA systems
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Article)We propose a credit-based resource allocation technique for dynamic spectrum access that is robust against malicious and selfish behaviors and ensures good overall system fairness performance while also allowing spectrum ... -
Malware Classification Based on Multilayer Perception and Word2Vec for IoT Security
( Association for Computing Machinery , 2022 , Article)With the construction of smart cities, the number of Internet of Things (IoT) devices is growing rapidly, leading to an explosive growth of malware designed for IoT devices. These malware pose a serious threat to the ... -
Malware detection based on graph attention networks for intelligent transportation systems
( MDPI , 2021 , Article)Intelligent Transportation Systems (ITS) aim to make transportation smarter, safer, reliable, and environmentally friendly without detrimentally affecting the service quality. ITS can face security issues due to their ... -
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation
( Institute of Electrical and Electronics Engineers Inc. , 2021 , Article)Advanced persistent threat (APT), with intense penetration, long duration, and high customization, has become one of the most grievous threats to cybersecurity. Furthermore, the design and development of Internet-of-Things ... -
Managing Client-Specific Customised Functions in Multi-Tenant Software-as-a-Service
( Institute of Electrical and Electronics Engineers Inc. , 2017 , Conference Paper)Maintainability and easy-to-customisation are some quality properties that most application software in software-as-a-service (SaaS) should posses. These quality attributes are the pre requisite for most application software ... -
Managing criticalities of e-health IoT systems
( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Lately, Internet-based solutions, brought by the Internet of Things (IoT) and cloud computation and storage technologies, have been driving revolutionary approaches in innumerable domains, including the sensitive domain ... -
Managing optimality in multi-sensor data fusion consistency using intersection and largest ellipsoid algorithms
( Nova Science Publishers, Inc. , 2009 , Book chapter)The purpose of this chapter is to provide a theoretical and practical framework to tackle the target tracking problem known as the track-to-track correlation problem. When static (e.g. radars) or dynamic (e.g. AWACs) sensors ... -
Managing Security Control Assumptions Using Causal Traceability
( Institute of Electrical and Electronics Engineers Inc. , 2015 , Conference Paper)Security control specifications of software systems are designed to meet their security requirements. It is difficult to know both the value of assets and the malicious intention of attackers at design time, hence assumptions ... -
The many benefits of annotator rationales for relevance judgments
( International Joint Conferences on Artificial Intelligence , 2017 , Conference Paper)When collecting subjective human ratings of items, it can be difficult to measure and enforce data quality due to task subjectivity and lack of insight into how judges arrive at each rating decision. To address this, we ... -
Market-Based Model in CR-IoT: A QProbabilistic Multi-agent Reinforcement Learning Approach
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)The ever-increasing urban population and the corresponding material demands have brought unprecedented burdens to cities. To guarantee better QoS for citizens, smart cities leverage emerging technologies such as the Cognitive ... -
MARL: Multimodal Attentional Representation Learning for Disease Prediction
( Springer Science and Business Media Deutschland GmbH , 2021 , Conference Paper)Existing learning models often utilise CT-scan images to predict lung diseases. These models are posed by high uncertainties that affect lung segmentation and visual feature learning. We introduce MARL, a novel Multimodal ... -
MASACAD: A multi-agent approach to information customization for the purpose of academic advising of students
( Elsevier B.V. , 2006 , Article)The growth and advancement in the Internet and the World Wide Web has led to an explosion in the amount of available information. This staggering amount of information has made it extremely difficult for users to locate ... -
MASACAD: a multiagent based approach to information customization
( IEEE , 2006 , Article)MASACAD is a multiagent information customization system that adopts the machine-learning paradigm to advise students by mining the Web. In the distributed problem-solving paradigm, systems can distribute among themselves ... -
Mathematical Evaluation of Human Immune Systems for Securing Software Defined Networks
( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)The immune system of the human body has massive potential in defending it against multiple harmful viruses and foreign bodies. All through their developmental history, human beings have been contaminated by micro-organisms. ...