In March 2024,European Union(EU)lawmakers passed the world’s first comprehensive set of regulations governing the use of artificial intelligence(AI)[1].The EU’s AI Act,two and a half years in the making,was initiall...In March 2024,European Union(EU)lawmakers passed the world’s first comprehensive set of regulations governing the use of artificial intelligence(AI)[1].The EU’s AI Act,two and a half years in the making,was initially drawn up as a landmark bill to reduce harm in areas in which AI was thought to pose the biggest risks to people,such as in health care,education,and security,as well as banning uses that pose“unacceptable risks,”including manipulation of human behavior and evaluation of individuals’trustworthiness based on personal characteristics.According to the regulations,which will go into effect in stages over the next two years,“high-risk”AI systems will require risk-mitigation strategies,high-quality data sets,transparency,better documentation,and human supervision.The most common current AI uses,such as augmenting recommendation engines and email spam filters,will see far less oversight.展开更多
Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectio...Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.展开更多
Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Te...Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks.The study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron algorithms.The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching 0.99.This study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems.展开更多
Instructions for Submissions All manuscripts should be submitted in a single file(including text,notes,references,figures,and tables)in MS-Word(doc)or Ado-be Acrobat(pdf)format only by email to asiaar@163.com.Authors ...Instructions for Submissions All manuscripts should be submitted in a single file(including text,notes,references,figures,and tables)in MS-Word(doc)or Ado-be Acrobat(pdf)format only by email to asiaar@163.com.Authors submitting papers by normal mail or courier will automatically be re-quested to provide an electronie of their paper,and the refereeing process will not commence until after the electronic version is received by the Editorial Office.Once a paper has been accepted for publication,authors who submitted their papers in Adobe Acrobat(pdf)for-mat will be required to provide the final publication version of their paper in MS-Word(doc).The preferred format for the final publica-tion version of graphs and charts is eps format,but Excel format is also acceptable.Excel format is acceptable for the final publication version of Tables.展开更多
文摘In March 2024,European Union(EU)lawmakers passed the world’s first comprehensive set of regulations governing the use of artificial intelligence(AI)[1].The EU’s AI Act,two and a half years in the making,was initially drawn up as a landmark bill to reduce harm in areas in which AI was thought to pose the biggest risks to people,such as in health care,education,and security,as well as banning uses that pose“unacceptable risks,”including manipulation of human behavior and evaluation of individuals’trustworthiness based on personal characteristics.According to the regulations,which will go into effect in stages over the next two years,“high-risk”AI systems will require risk-mitigation strategies,high-quality data sets,transparency,better documentation,and human supervision.The most common current AI uses,such as augmenting recommendation engines and email spam filters,will see far less oversight.
基金supported by the National Natural Science Foundation of China(Nos.62172337,62241207)Key Project of GansuNatural Science Foundation(No.23JRRA685).
文摘Traditional email systems can only achieve one-way communication,which means only the receiver is allowed to search for emails on the email server.In this paper,we propose a blockchain-based certificateless bidirectional authenticated searchable encryption model for a cloud email system named certificateless authenticated bidirectional searchable encryption(CL-BSE)by combining the storage function of cloud server with the communication function of email server.In the new model,not only can the data receiver search for the relevant content by generating its own trapdoor,but the data owner also can retrieve the content in the same way.Meanwhile,there are dual authentication functions in our model.First,during encryption,the data owner uses the private key to authenticate their identity,ensuring that only legal owner can generate the keyword ciphertext.Second,the blockchain verifies the data owner’s identity by the received ciphertext,allowing only authorized members to store their data in the server and avoiding unnecessary storage space consumption.We obtain a formal definition of CL-BSE and formulate a specific scheme from the new system model.Then the security of the scheme is analyzed based on the formalized security model.The results demonstrate that the scheme achieves multikeyword ciphertext indistinguishability andmulti-keyword trapdoor privacy against any adversary simultaneously.In addition,performance evaluation shows that the new scheme has higher computational and communication efficiency by comparing it with some existing ones.
文摘Cybercriminals often use fraudulent emails and fictitious email accounts to deceive individuals into disclosing confidential information,a practice known as phishing.This study utilizes three distinct methodologies,Term Frequency-Inverse Document Frequency,Word2Vec,and Bidirectional Encoder Representations from Transform-ers,to evaluate the effectiveness of various machine learning algorithms in detecting phishing attacks.The study uses feature extraction methods to assess the performance of Logistic Regression,Decision Tree,Random Forest,and Multilayer Perceptron algorithms.The best results for each classifier using Term Frequency-Inverse Document Frequency were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).Word2Vec’s best results were Multilayer Perceptron(Precision:0.98,Recall:0.98,F1-score:0.98,Accuracy:0.98).The highest performance was achieved using the Bidirectional Encoder Representations from the Transformers model,with Precision,Recall,F1-score,and Accuracy all reaching 0.99.This study highlights how advanced pre-trained models,such as Bidirectional Encoder Representations from Transformers,can significantly enhance the accuracy and reliability of fraud detection systems.
文摘Instructions for Submissions All manuscripts should be submitted in a single file(including text,notes,references,figures,and tables)in MS-Word(doc)or Ado-be Acrobat(pdf)format only by email to asiaar@163.com.Authors submitting papers by normal mail or courier will automatically be re-quested to provide an electronie of their paper,and the refereeing process will not commence until after the electronic version is received by the Editorial Office.Once a paper has been accepted for publication,authors who submitted their papers in Adobe Acrobat(pdf)for-mat will be required to provide the final publication version of their paper in MS-Word(doc).The preferred format for the final publica-tion version of graphs and charts is eps format,but Excel format is also acceptable.Excel format is acceptable for the final publication version of Tables.