Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (1,767)
  • Open Access

    ARTICLE

    A Novel Attack on Complex APUFs Using the Evolutionary Deep Convolutional Neural Network

    Ali Ahmadi Shahrakht1, Parisa Hajirahimi2, Omid Rostami3, Diego Martín4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3059-3081, 2023, DOI:10.32604/iasc.2023.040502

    Abstract As the internet of things (IoT) continues to expand rapidly, the significance of its security concerns has grown in recent years. To address these concerns, physical unclonable functions (PUFs) have emerged as valuable tools for enhancing IoT security. PUFs leverage the inherent randomness found in the embedded hardware of IoT devices. However, it has been shown that some PUFs can be modeled by attackers using machine-learning-based approaches. In this paper, a new deep learning (DL)-based modeling attack is introduced to break the resistance of complex XAPUFs. Because training DL models is a problem that falls under the category of NP-hard… More >

  • Open Access

    ARTICLE

    Distributed Active Partial Label Learning

    Zhen Xu1,2, Weibin Chen1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2627-2650, 2023, DOI:10.32604/iasc.2023.040497

    Abstract Active learning (AL) trains a high-precision predictor model from small numbers of labeled data by iteratively annotating the most valuable data sample from an unlabeled data pool with a class label throughout the learning process. However, most current AL methods start with the premise that the labels queried at AL rounds must be free of ambiguity, which may be unrealistic in some real-world applications where only a set of candidate labels can be obtained for selected data. Besides, most of the existing AL algorithms only consider the case of centralized processing, which necessitates gathering together all the unlabeled data in… More >

  • Open Access

    ARTICLE

    Performance Evaluation of Three-Dimensional UWB Real-Time Locating Auto-Positioning System for Fire Rescue

    Hang Yang1,2,3,*, Xunbo Li1, Witold Pedrycz2

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3039-3058, 2023, DOI:10.32604/iasc.2023.040412

    Abstract Fire rescue challenges and solutions have evolved from straightforward plane rescue to encompass 3D space due to the rise of high-rise city buildings. Hence, this study facilitates a system with quick and simplified on-site launching and generates real-time location data, enabling fire rescuers to arrive at the intended spot faster and correctly for effective and precise rescue. Auto-positioning with step-by-step instructions is proposed when launching the locating system, while no extra measuring instrument like Total Station (TS) is needed. Real-time location tracking is provided via a 3D space real-time locating system (RTLS) constructed using Ultra-wide Bandwidth technology (UWB), which requires… More >

  • Open Access

    ARTICLE

    An Automatic Classification Grading of Spinach Seedlings Water Stress Based on N-MobileNetXt

    Yanlei Xu, Xue Cong, Yuting Zhai, Zhiyuan Gao, Helong Yu*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 3019-3037, 2023, DOI:10.32604/iasc.2023.040330

    Abstract To solve inefficient water stress classification of spinach seedlings under complex background, this study proposed an automatic classification method for the water stress level of spinach seedlings based on the N-MobileNetXt (NCAM+MobileNetXt) network. Firstly, this study reconstructed the Sandglass Block to effectively increase the model accuracy; secondly, this study introduced the group convolution module and a two-dimensional adaptive average pool, which can significantly compress the model parameters and enhance the model robustness separately; finally, this study innovatively proposed the Normalization-based Channel Attention Module (NCAM) to enhance the image features obviously. The experimental results showed that the classification accuracy of N-MobileNetXt… More >

  • Open Access

    ARTICLE

    State Accurate Representation and Performance Prediction Algorithm Optimization for Industrial Equipment Based on Digital Twin

    Ying Bai1,*, Xiaoti Ren2, Hong Li1

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2999-3018, 2023, DOI:10.32604/iasc.2023.040124

    Abstract The combination of the Industrial Internet of Things (IIoT) and digital twin (DT) technology makes it possible for the DT model to realize the dynamic perception of equipment status and performance. However, conventional digital modeling is weak in the fusion and adjustment ability between virtual and real information. The performance prediction based on experience greatly reduces the inclusiveness and accuracy of the model. In this paper, a DT-IIoT optimization model is proposed to improve the real-time representation and prediction ability of the key equipment state. Firstly, a global real-time feedback and the dynamic adjustment mechanism is established by combining DT-IIoT… More >

  • Open Access

    ARTICLE

    Design the IoT Botnet Defense Process for Cybersecurity in Smart City

    Donghyun Kim1, Seungho Jeon2, Jiho Shin3, Jung Taek Seo4,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2979-2997, 2023, DOI:10.32604/iasc.2023.040019

    Abstract The smart city comprises various infrastructures, including healthcare, transportation, manufacturing, and energy. A smart city’s Internet of Things (IoT) environment constitutes a massive IoT environment encompassing numerous devices. As many devices are installed, managing security for the entire IoT device ecosystem becomes challenging, and attack vectors accessible to attackers increase. However, these devices often have low power and specifications, lacking the same security features as general Information Technology (IT) systems, making them susceptible to cyberattacks. This vulnerability is particularly concerning in smart cities, where IoT devices are connected to essential support systems such as healthcare and transportation. Disruptions can lead… More >

  • Open Access

    ARTICLE

    Multi-Domain Malicious Behavior Knowledge Base Framework for Multi-Type DDoS Behavior Detection

    Ouyang Liu, Kun Li*, Ziwei Yin, Deyun Gao, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2955-2977, 2023, DOI:10.32604/iasc.2023.039995

    Abstract Due to the many types of distributed denial-of-service attacks (DDoS) attacks and the large amount of data generated, it becomes a challenge to manage and apply the malicious behavior knowledge generated by DDoS attacks. We propose a malicious behavior knowledge base framework for DDoS attacks, which completes the construction and application of a multi-domain malicious behavior knowledge base. First, we collected malicious behavior traffic generated by five mainstream DDoS attacks. At the same time, we completed the knowledge collection mechanism through data pre-processing and dataset design. Then, we designed a malicious behavior category graph and malicious behavior structure graph for… More >

  • Open Access

    ARTICLE

    FIDS: Filtering-Based Intrusion Detection System for In-Vehicle CAN

    Seungmin Lee, Hyunghoon Kim, Haehyun Cho, Hyo Jin Jo*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2941-2954, 2023, DOI:10.32604/iasc.2023.039992

    Abstract Modern vehicles are equipped with multiple Electronic Control Units (ECUs) that support various convenient driving functions, such as the Advanced Driver Assistance System (ADAS). To enable communication between these ECUs, the Controller Area Network (CAN) protocol is widely used. However, since CAN lacks any security technologies, it is vulnerable to cyber attacks. To address this, researchers have conducted studies on machine learning-based intrusion detection systems (IDSs) for CAN. However, most existing IDSs still have non-negligible detection errors. In this paper, we propose a new filtering-based intrusion detection system (FIDS) to minimize the detection errors of machine learning-based IDSs. FIDS uses… More >

  • Open Access

    ARTICLE

    Dynamic Security SFC Branching Path Selection Using Deep Reinforcement Learning

    Shuangxing Deng, Man Li*, Huachun Zhou

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2919-2939, 2023, DOI:10.32604/iasc.2023.039985

    Abstract Security service function chaining (SFC) based on software-defined networking (SDN) and network function virtualization (NFV) technology allows traffic to be forwarded sequentially among different security service functions to achieve a combination of security functions. Security SFC can be deployed according to requirements, but the current SFC is not flexible enough and lacks an effective feedback mechanism. The SFC is not traffic aware and the changes of traffic may cause the previously deployed security SFC to be invalid. How to establish a closed-loop mechanism to enhance the adaptive capability of the security SFC to malicious traffic has become an important issue.… More >

  • Open Access

    ARTICLE

    Wake-Up Security: Effective Security Improvement Mechanism for Low Power Internet of Things

    Sun-Woo Yun1, Na-Eun Park1, Il-Gu Lee1,2,*

    Intelligent Automation & Soft Computing, Vol.37, No.3, pp. 2897-2917, 2023, DOI:10.32604/iasc.2023.039940

    Abstract As time and space constraints decrease due to the development of wireless communication network technology, the scale and scope of cyberattacks targeting the Internet of Things (IoT) are increasing. However, it is difficult to apply high-performance security modules to the IoT owing to the limited battery, memory capacity, and data transmission performance depending on the size of the device. Conventional research has mainly reduced power consumption by lightening encryption algorithms. However, it is difficult to defend large-scale information systems and networks against advanced and intelligent attacks because of the problem of deteriorating security performance. In this study, we propose wake-up… More >

Displaying 41-50 on page 5 of 1767. Per Page