As a representative emerging machine learning technique, federated learning(FL) has gained considerable popularity for its special feature of “making data available but not visible”. However, potential problems rema...As a representative emerging machine learning technique, federated learning(FL) has gained considerable popularity for its special feature of “making data available but not visible”. However, potential problems remain, including privacy breaches, imbalances in payment, and inequitable distribution.These shortcomings let devices reluctantly contribute relevant data to, or even refuse to participate in FL. Therefore, in the application of FL, an important but also challenging issue is to motivate as many participants as possible to provide high-quality data to FL. In this paper, we propose an incentive mechanism for FL based on the continuous zero-determinant(CZD) strategies from the perspective of game theory. We first model the interaction between the server and the devices during the FL process as a continuous iterative game. We then apply the CZD strategies for two players and then multiple players to optimize the social welfare of FL, for which we prove that the server can keep social welfare at a high and stable level. Subsequently, we design an incentive mechanism based on the CZD strategies to attract devices to contribute all of their high-accuracy data to FL.Finally, we perform simulations to demonstrate that our proposed CZD-based incentive mechanism can indeed generate high and stable social welfare in FL.展开更多
E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have va...E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have varying levels of understanding when it comes to securing an online application.Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws.Many published articles focused on these attacks’binary classification.This article described a novel deep-learning approach for detecting SQL injection and XSS attacks.The datasets for SQL injection and XSS payloads are combined into a single dataset.The dataset is labeledmanually into three labels,each representing a kind of attack.This work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a vector.Our model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload dataset.The payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and normal.The outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious payloads.BiLSTM’s high performance was demonstrated by its accuracy of 99.26%.展开更多
Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace.Similarly,the field of health informatics is also considered as an extremely important field.This work observes the...Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace.Similarly,the field of health informatics is also considered as an extremely important field.This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis.The developed system has two front ends,the first dedicated for the user to perform the photographing of the trace report.Once the photographing is complete,mobile computing is used to extract the signal.Once the signal is extracted,it is uploaded into the server and further analysis is performed on the signal in the cloud.Once this is done,the second interface,intended for the use of the physician,can download and view the trace from the cloud.The data is securely held using a password-based authentication method.The system presented here is one of the first attempts at delivering the total solution,and after further upgrades,it will be possible to deploy the system in a commercial setting.展开更多
Oil production estimation plays a critical role in economic plans for local governments and organizations.Therefore,many studies applied different Artificial Intelligence(AI)based meth-ods to estimate oil production i...Oil production estimation plays a critical role in economic plans for local governments and organizations.Therefore,many studies applied different Artificial Intelligence(AI)based meth-ods to estimate oil production in different countries.The Adaptive Neuro-Fuzzy Inference System(ANFIS)is a well-known model that has been successfully employed in various applica-tions,including time-series forecasting.However,the ANFIS model faces critical shortcomings in its parameters during the configuration process.From this point,this paper works to solve the drawbacks of the ANFIS by optimizing ANFIS parameters using a modified Aquila Optimizer(AO)with the Opposition-Based Learning(OBL)technique.The main idea of the developed model,AOOBL-ANFIS,is to enhance the search process of the AO and use the AOOBL to boost the performance of the ANFIS.The proposed model is evaluated using real-world oil produc-tion datasets collected from different oilfields using several performance metrics,including Root Mean Square Error(RMSE),Mean Absolute Error(MAE),coefficient of determination(R2),Standard Deviation(Std),and computational time.Moreover,the AOOBL-ANFIS model is compared to several modified ANFIS models include Particle Swarm Optimization(PSO)-ANFIS,Grey Wolf Optimizer(GWO)-ANFIS,Sine Cosine Algorithm(SCA)-ANFIS,Slime Mold Algorithm(SMA)-ANFIS,and Genetic Algorithm(GA)-ANFIS,respectively.Additionally,it is compared to well-known time series forecasting methods,namely,Autoregressive Integrated Moving Average(ARIMA),Long Short-Term Memory(LSTM),Seasonal Autoregressive Integrated Moving Average(SARIMA),and Neural Network(NN).The outcomes verified the high performance of the AOOBL-ANFIS,which outperformed the classic ANFIS model and the compared models.展开更多
Human activity tracking plays a vital role in human–computer interaction.Traditional human activity recognition(HAR)methods adopt special devices,such as cameras and sensors,to track both macro-and micro-activities.R...Human activity tracking plays a vital role in human–computer interaction.Traditional human activity recognition(HAR)methods adopt special devices,such as cameras and sensors,to track both macro-and micro-activities.Recently,wireless signals have been exploited to track human motion and activities in indoor environments without additional equipment.This study proposes a device-free WiFi-based micro-activity recognition method that leverages the channel state information(CSI)of wireless signals.Different from existed CSI-based microactivity recognition methods,the proposed method extracts both amplitude and phase information from CSI,thereby providing more information and increasing detection accuracy.The proposed method harnesses an effective signal processing technique to reveal the unique patterns of each activity.We applied a machine learning algorithm to recognize the proposed micro-activities.The proposed method has been evaluated in both line of sight(LOS)and none line of sight(NLOS)scenarios,and the empirical results demonstrate the effectiveness of the proposed method with several users.展开更多
基金partially supported by the National Natural Science Foundation of China (62173308)the Natural Science Foundation of Zhejiang Province of China (LR20F030001)the Jinhua Science and Technology Project (2022-1-042)。
文摘As a representative emerging machine learning technique, federated learning(FL) has gained considerable popularity for its special feature of “making data available but not visible”. However, potential problems remain, including privacy breaches, imbalances in payment, and inequitable distribution.These shortcomings let devices reluctantly contribute relevant data to, or even refuse to participate in FL. Therefore, in the application of FL, an important but also challenging issue is to motivate as many participants as possible to provide high-quality data to FL. In this paper, we propose an incentive mechanism for FL based on the continuous zero-determinant(CZD) strategies from the perspective of game theory. We first model the interaction between the server and the devices during the FL process as a continuous iterative game. We then apply the CZD strategies for two players and then multiple players to optimize the social welfare of FL, for which we prove that the server can keep social welfare at a high and stable level. Subsequently, we design an incentive mechanism based on the CZD strategies to attract devices to contribute all of their high-accuracy data to FL.Finally, we perform simulations to demonstrate that our proposed CZD-based incentive mechanism can indeed generate high and stable social welfare in FL.
基金funded byResearchers Supporting Project Number(RSP2023R476)King Saud University,Riyadh,Saudi Arabia。
文摘E-commerce,online ticketing,online banking,and other web-based applications that handle sensitive data,such as passwords,payment information,and financial information,are widely used.Various web developers may have varying levels of understanding when it comes to securing an online application.Structured Query language SQL injection and cross-site scripting are the two vulnerabilities defined by the OpenWeb Application Security Project(OWASP)for its 2017 Top Ten List Cross Site Scripting(XSS).An attacker can exploit these two flaws and launch malicious web-based actions as a result of these flaws.Many published articles focused on these attacks’binary classification.This article described a novel deep-learning approach for detecting SQL injection and XSS attacks.The datasets for SQL injection and XSS payloads are combined into a single dataset.The dataset is labeledmanually into three labels,each representing a kind of attack.This work implements some pre-processing algorithms,including Porter stemming,one-hot encoding,and the word-embedding method to convert a word’s text into a vector.Our model used bidirectional long short-term memory(BiLSTM)to extract features automatically,train,and test the payload dataset.The payloads were classified into three types by BiLSTM:XSS,SQL injection attacks,and normal.The outcomes demonstrated excellent performance in classifying payloads into XSS attacks,injection attacks,and non-malicious payloads.BiLSTM’s high performance was demonstrated by its accuracy of 99.26%.
文摘Mobile cloud computing is an emerging field that is gaining popularity across borders at a rapid pace.Similarly,the field of health informatics is also considered as an extremely important field.This work observes the collaboration between these two fields to solve the traditional problem of extracting Electrocardiogram signals from trace reports and then performing analysis.The developed system has two front ends,the first dedicated for the user to perform the photographing of the trace report.Once the photographing is complete,mobile computing is used to extract the signal.Once the signal is extracted,it is uploaded into the server and further analysis is performed on the signal in the cloud.Once this is done,the second interface,intended for the use of the physician,can download and view the trace from the cloud.The data is securely held using a password-based authentication method.The system presented here is one of the first attempts at delivering the total solution,and after further upgrades,it will be possible to deploy the system in a commercial setting.
基金supported by National Natural Science Foundation of China(Grant No.62150410434)National Key Research and Development Program of China(Grant No.2019Y FB1405600)by LIESMARS Special Research Funding.
文摘Oil production estimation plays a critical role in economic plans for local governments and organizations.Therefore,many studies applied different Artificial Intelligence(AI)based meth-ods to estimate oil production in different countries.The Adaptive Neuro-Fuzzy Inference System(ANFIS)is a well-known model that has been successfully employed in various applica-tions,including time-series forecasting.However,the ANFIS model faces critical shortcomings in its parameters during the configuration process.From this point,this paper works to solve the drawbacks of the ANFIS by optimizing ANFIS parameters using a modified Aquila Optimizer(AO)with the Opposition-Based Learning(OBL)technique.The main idea of the developed model,AOOBL-ANFIS,is to enhance the search process of the AO and use the AOOBL to boost the performance of the ANFIS.The proposed model is evaluated using real-world oil produc-tion datasets collected from different oilfields using several performance metrics,including Root Mean Square Error(RMSE),Mean Absolute Error(MAE),coefficient of determination(R2),Standard Deviation(Std),and computational time.Moreover,the AOOBL-ANFIS model is compared to several modified ANFIS models include Particle Swarm Optimization(PSO)-ANFIS,Grey Wolf Optimizer(GWO)-ANFIS,Sine Cosine Algorithm(SCA)-ANFIS,Slime Mold Algorithm(SMA)-ANFIS,and Genetic Algorithm(GA)-ANFIS,respectively.Additionally,it is compared to well-known time series forecasting methods,namely,Autoregressive Integrated Moving Average(ARIMA),Long Short-Term Memory(LSTM),Seasonal Autoregressive Integrated Moving Average(SARIMA),and Neural Network(NN).The outcomes verified the high performance of the AOOBL-ANFIS,which outperformed the classic ANFIS model and the compared models.
文摘Human activity tracking plays a vital role in human–computer interaction.Traditional human activity recognition(HAR)methods adopt special devices,such as cameras and sensors,to track both macro-and micro-activities.Recently,wireless signals have been exploited to track human motion and activities in indoor environments without additional equipment.This study proposes a device-free WiFi-based micro-activity recognition method that leverages the channel state information(CSI)of wireless signals.Different from existed CSI-based microactivity recognition methods,the proposed method extracts both amplitude and phase information from CSI,thereby providing more information and increasing detection accuracy.The proposed method harnesses an effective signal processing technique to reveal the unique patterns of each activity.We applied a machine learning algorithm to recognize the proposed micro-activities.The proposed method has been evaluated in both line of sight(LOS)and none line of sight(NLOS)scenarios,and the empirical results demonstrate the effectiveness of the proposed method with several users.