期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Lightweight Intrusion Detection Using Reservoir Computing
1
作者 jiarui deng Wuqiang Shen +4 位作者 Yihua Feng Guosheng Lu Guiquan Shen Lei Cui Shanxiang Lyu 《Computers, Materials & Continua》 SCIE EI 2024年第1期1345-1361,共17页
The blockchain-empowered Internet of Vehicles(IoV)enables various services and achieves data security and privacy,significantly advancing modern vehicle systems.However,the increased frequency of data transmission and... The blockchain-empowered Internet of Vehicles(IoV)enables various services and achieves data security and privacy,significantly advancing modern vehicle systems.However,the increased frequency of data transmission and complex network connections among nodes also make them more susceptible to adversarial attacks.As a result,an efficient intrusion detection system(IDS)becomes crucial for securing the IoV environment.Existing IDSs based on convolutional neural networks(CNN)often suffer from high training time and storage requirements.In this paper,we propose a lightweight IDS solution to protect IoV against both intra-vehicle and external threats.Our approach achieves superior performance,as demonstrated by key metrics such as accuracy and precision.Specifically,our method achieves accuracy rates ranging from 99.08% to 100% on the Car-Hacking dataset,with a remarkably short training time. 展开更多
关键词 Echo state network intrusion detection system Internet of Vehicles reservoir computing
下载PDF
Data Hiding in the Division Domain:Simultaneously Achieving Robustness to Scaling and Additive Attacks
2
作者 Shu Yu Junren Qin +2 位作者 jiarui deng Shanxiang Lyu Fagang Li 《国际计算机前沿大会会议论文集》 2022年第2期47-58,共12页
Data hiding plays an important role in privacy protection and authentication,but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks.To this end,this pap... Data hiding plays an important role in privacy protection and authentication,but most data hiding methods fail to achieve satisfactory performance in resisting scaling attacks and additive attacks.To this end,this paper proposes a new quantization index modulation(QIM)variant based on division domains(D-QIM).It can not only resist the above two attacks well,but also adjust the performance trade-offs by controlling the parameters.Simulation results confirm the performance gain of D-QIM in terms of the bit error rate(BER). 展开更多
关键词 Data hiding Robust watermarking Quantization index modulation(QIM)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部