Xinyi Ding, Zohreh Raziei, Eric C. Larson, Eli V. Olinick, Paul S. Krueger, Michael Hahsler
AbstractThe tremendous success of deep learning for imaging applications has
resulted in numerous beneficial advances. Unfortunately, this success has also
been a catalyst for malicious uses such as photo-realistic face swapping of
parties without consent. In this study, we use deep transfer learning for face
swapping detection, showing true positive rates greater than 96% with very few
false alar... hiện toàn bộ
AbstractThe rapid development of IoT technology has led to the usage of various
devices in our daily life. Along with the ever-increasing rise of the Internet
of Things, the use of appropriate methods for establishing secure communications
in health care systems is vital. The adoption of high-security optimal
mechanisms for this purpose has been more effective regarding the efficiency of
medical i... hiện toàn bộ
T. Rama Reddy, P. Jayarama Reddy, Rayudu Srinivas, Ch. V. Raghavendran, R. V. S. Lalitha, B. Annapurna
AbstractEducation acts as a soul in the overall societal development, in one way
or the other. Aspirants, who gain their degrees genuinely, will help society
with their knowledge and skills. But, on the other side of the coin, the problem
of fake certificates is alarming and worrying. It has been prevalent in
different forms from paper-based dummy certificates to replicas backed with
database tamp... hiện toàn bộ
AbstractSHDM stands for Sphere-Hardening Dither Modulation and is a watermarking
algorithm based on quantizing the norm of a vector extracted from the cover
work. We show how SHDM can be integrated into a fully commutative
watermarking-encryption scheme and investigate implementations in the spatial,
DCT, and DWT domain with respect to their fidelity, robustness, capacity, and
security of encrypti... hiện toàn bộ
AbstractIn order to further improve the accuracy and efficiency of network
information security situation prediction, this study used the dynamic
equal-dimensional method based on gray correlation analysis to improve the GM
(1, N) model and carried out an experiment on the designed network security
situation prediction (NSSP) model in a simulated network environment. It was
found that the predicte... hiện toàn bộ
Sebastiano Battiato, Oliver Giudice, Francesco Guarnera, Giovanni Puglisi
AbstractThe JPEG compression algorithm has proven to be efficient in saving
storage and preserving image quality thus becoming extremely popular. On the
other hand, the overall process leaves traces into encoded signals which are
typically exploited for forensic purposes: for instance, the compression
parameters of the acquisition device (or editing software) could be inferred. To
this aim, in thi... hiện toàn bộ
AbstractDifferent types of network traffic can be treated as data originating
from different domains with the same objectives of problem-solving. Previous
work utilizing multi-domain machine learning has primarily assumed that data in
different domains have the same distribution, which fails to effectively address
the domain offset problem and may not achieve excellent performance in every
domain.... hiện toàn bộ
AbstractWireless sensor networks, as an emerging information exchange
technology, have been widely applied in many fields. However, nodes tend to
become damaged in harsh and complex environmental conditions. In order to
effectively diagnose node faults, a Bayesian model-based node fault diagnosis
model was proposed. Firstly, a comprehensive analysis was conducted into the
operative principles of w... hiện toàn bộ
AbstractThis paper reports the findings from an empirical study investigating
the effectiveness of using intelligent voice assistants, Amazon Alexa in our
case, to deliver a phishing training to users. Because intelligent voice
assistants can hardly utilize visual cues but provide for convenient interaction
with users, we developed an interaction-based phishing training focused on the
principles o... hiện toàn bộ