Assessment of IIoT Sensor Security Vulnerabilities in Digital Wine Manufacturing Leveraging the CVSS
A survey on evaluation of blockchain-based agricultural traceability
Crop monitoring by multimodal remote sensing: A review
Preface - ICSIM 2024: Proceedings of the 2024 7th International Conference on Software Engineering and Information Management
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models
Critical Data Detection for Dynamically Adjustable Product Quality in IIoT-Enabled Manufacturing
MCSNet+: Enhanced Convolutional Neural Network for Detection and Classification of Tribolium and Sitophilus Sibling Species in Actual Wheat Storage Environments
Auto-identification of two Sitophilus sibling species on stored wheat using deep convolutional neural network
Coding Observer Nodes for Sybil Attacks Detection in Mobile Wireless Sensor Networks
(Conference) Preface - 4th International Conference on Smart Technologies in Data Science and Communication, SMART-DSC 2021
Indoor emission sources detection by pollutants interaction analysis
This study employs the correlation coefficients technique to support emission sources detection...
Privacy-Aware Data Fusion and Prediction with Spatial-Temporal Context for Smart City Industrial Environment
As one of the cyber-physical-social systems that plays a key role in people's daily activities, a...
S-Box Construction Method Based on the Combination of Quantum Chaos and PWLCM Chaotic Map
CDMC’19—The 10th International Cybersecurity Data Mining Competition
CDMC-International Cybersecurity Data Mining Competition (http://www.csmining.org) is a world...
Diversified and Scalable Service Recommendation With Accuracy Guarantee
As one of the most successful recommendation techniques, neighborhood-based collaborative...
Image Encryption Based on Fractional-order Chen Hyperchaotic System
This paper proposes a novel image encryption algorithm with the encrypted sequence encoded based...
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control
Secure interoperation is an important technology to protect shared data in multi-domain...
A Comprehensive Review of Computational Methods for Automatic Prediction of Schizophrenia With Insight Into Indigenous Populations
Psychiatrists rely on language and speech behavior as one of the main clues in psychiatric...
Deep learning for combo object detection
Convolutional neural networks (CNNs) have become the most vigorous technique for a variety of...
Editorial-Computational Intelligence Volume 35, Issue 3
[No abstract available]
S-boxes Construction Based on Quantum Chaos and PWLCM Chaotic Mapping
For a security system built on symmetric-key cryptography algorithms, the substitution box...
Deep transfer learning via minimum enclosing balls
Training of deep learning algorithms such as CNN, LSTM, or GRU often requires large amount of...
Merging weighted SVMs for parallel incremental learning
Parallel incremental learning is an effective approach for rapidly processing large scale data...
Online Max-flow Learning via Augmenting and De-augmenting Path
This paper presents an augmenting path based online max-flow algorithm. The proposed algorithm...
Task and instance quadratic ordering for active online multitask learning
For online multitask learning (oMTL), when a chunk of tasks consisting of multiple related...
Urban air pollution alert service for smart cities
With the advent of small, energy-efficient, interconnected and cheap air pollution sensors,...
A sandpile model for reliable actor-critic reinforcement learning
Actor-Critic algorithms have been increasingly researched for tackling challenging reinforcement...
Class-Wised Image Enhancement for Moving Object Detection at Maritime Boat Ramps
In the context of marine boat ramps traffic surveillance, we propose in this paper a novel image...
Detection of botnet activities through the lens of a large-scale darknet
The growing cyber-threats from botnets compel us to devise proper countermeasures to detect...
Malicious Events Grouping via Behavior Based Darknet Traffic Flow Analysis
This paper proposes a host behavior based darknet traffic decomposition approach to identifying...
Message from Smart Data 2016 Program Chairs
[No abstract available]
New mutation strategies of differential evolution based on clearing niche mechanism
Abstract: Although differential evolution (DE) algorithms have been widely proposed for tackling...
Privacy-preserving detection of statically mutually exclusive roles constraints violation in interoperable role-based access control
Secure interoperation is an important technology to protect shared data in multi-domain...
UnitecDEAMP: Flow feature profiling for malicious events identification in darknet space
This paper proposes a traffic decomposition approach called UnitecDEAMP based on flow feature...
A combo object model for maritime boat ramps traffic monitoring
Conventional tracking methods are incapable of tracking boats towed by vehicles on boat ramps...
COR-Honeypot: Copy-On-Risk, virtual machine as Honeypot in the cloud
This paper proposes Copy-On-Risk (COR) honeypot solution and implementation. Our prototype...
Generalized compatible function approximation for policy gradient search
Reinforcement learning aims at solving stochastic sequential decision making problems through...
Incremental and decremental max-flow for online semi-supervised learning
Max-flow has been adopted for semi-supervised data modelling, yet existing algorithms were...
Object trajectory association rules for tracking trailer boat in low-frame-rate videos
Tracking object accurately in one frame per minute (1-fpm) video is believed to be impossible,...
Reverse replication of virtual machines (rRVM) for low latency and high availability services
Virtualization supplies a straightforward approach to high availability through iterative...
Towards Early Detection of Novel Attack Patterns through the Lens of a Large-Scale Darknet
Darknet monitoring provides a cost-effective way to monitor the global trend of cyber-threats in...
Adaptive background modeling for land and water composition scenes
In the context of maritime boat ramps surveillance, this paper proposes an Adaptive Background...
A federated network online network traffics analysis engine for cybersecurity
Agent-oriented techniques are being increasingly used in a range of networking security...
Behavior based darknet traffic decomposition for malicious events identification
This paper proposes a host (corresponding to a source IP) behavior based traffic decomposition...
Planetlab europe as geographically-distributed testbed for software development and evaluation
In this paper, we analyse the use of PlanetLab Europe for development and evaluation of...
Reinforcement learning in continuous spaces by using learning fuzzy classifier systems
Agent-oriented techniques are being increasingly used in a range of networking security...
STRATUS: Towards returning data control to cloud users
When we upload or create data into the cloud or the web, we immediately lose control of our data....
A Learner-Independent Knowledge Transfer Approach to Multi-task Learning
This paper proposes a learner-independent multi-task learning (MTL) scheme in which knowledge...
Analysis and configuration of boundary difference calculations
In the field of land management, stakeholders (people) everywhere have many disputes over the...
Spatio-temporal PM2.5 prediction by spatial data aided incremental support vector regression
Machine learning requires sufficient and reliable data to enhance the prediction performance....
Squantum inspired evolutionary algorithm by representing candidate solution as normal distribution
Application of Quantum principles on evolutionary algorithms was started as early as late 1990s...
Stochastic decision making in learning classifier systems through a natural policy gradient method
Learning classifier systems (LCSs) are rule-based machine learning technologies designed to learn...
An incremental learning approach to continuous image change detection
This paper proposes a novel incremental learning based image change detection method capable of...
An intelligent agent based land encroachment detection approach
Land management and planning is essential to assist the economic growth, sustainable resource use...
Chunk incremental IDR/QR LDA learning
Training data in real world is often presented in random chunks. Yet existing sequential...
Dynamic class imbalance learning for incremental LPSVM
Linear Proximal Support Vector Machines (LPSVMs), like decision trees, classic SVM, etc. are...
Referential kNN regression for financial time series forecasting
In this paper we propose a new multivariate regression approach for financial time series...
Service provision control in federated service providing systems
Different from traditional P2P systems, individuals nodes of a Federated Service Providing (FSP)...
The effects of different representations on static structure analysis of computer malware signatures
The continuous growth of malware presents a problem for internet computing due to increasingly...
Behavior analysis of long-term cyber attacks in the darknet
Darknet monitoring provides us an effective way to countermeasure cyber attacks that pose a...
Class imbalance robust incremental LPSVM for data streams learning
Linear Proximal Support Vector Machines (LPSVM), like decision trees, classic SVM, etc. are...
Exploring crude oil impacts to oil stocks through graphical computational correlation analysis
This paper presented the relationship between the world price of crude oil and oil related stocks...
LDA merging and splitting with applications to multiagent cooperative learning and system alteration
To adapt linear discriminant analysis (LDA) to real-world applications, there is a pressing need...
Malicioius software detection using multiple sequence alignment and data mining
Malware is currently a major threat to information and computer security, with the volume and...
Multiple sequence alignment and artificial neural networks for malicious software detection
Malware is currently a major threat to information and computer security, with the volume and...
SDE-driven service provision control
The service-oriented architecture (SOA) allows distributed resources to be provided through...
The effects of different representations on malware motif identification
Sequence alignment is widely used in bioinformatics for revealing the genetic diversity of...
Training minimum enclosing balls for cross tasks knowledge transfer
This paper proposes a learner independent multi-task learning (MTL) scheme such that M L = L(T i,...
Correlation-aided support vector regression for forex time series prediction
Market is often found behaving surprisingly similar to history, which implies that correlation...
Personalized mode transductive spanning SVM classification tree
Personalized transductive learning (PTL) builds a unique local model for classification of...
A modified fuzzy C-means with particle swarm optimization adaptive image segmentation algorithm
A new method which the numbers of cluster is self-adapted and use up and down cut-off of FCM...
Factorizing class characteristics via group MEBs construction
Classic MEB (minimum enclosing ball) models characteristics of each class for classification by...
Handwritten digits recognition using HMM and PSO based on storks
A new method for handwritten digits recognition based on hidden markov model (HMM) and particle...
Incremental and decremental LDA learning with applications
To adapt linear discriminant analysis (LDA) to real world applications, there is a pressing...
Online feature extraction for evolving intelligent systems
[No abstract available]
Tuning N-gram string kernel SVMs via meta learning
Even though Support Vector Machines (SVMs) are capable of identifying patterns in high...
Encoding and decoding the knowledge of association rules over SVM classification trees
This paper presents a constructive method for association rule extraction, where the knowledge of...
Curiosity-driven multi-agent competitive and cooperative lda learning
This paper presents a novel multi-agent competitive and cooperative learning method using...
Incremental learning of chunk data for online pattern classification systems
This paper presents a pattern classification system in which feature extraction and classifier...
SVMT-rule: Association rule mining over SVM classification trees
Since support vector machines (SVM) [7-9] demonstrate a good accuracy in classification and...
Classification consistency analysis for bootstrapping gene selection
Consistency modelling for gene selection is a new topic emerging from recent cancer...
Classifying microRNAs by Gabor filter features from 2D structure bitmap images on a case study of human microRNAs
MicroRNAs are recently discovered small, 20-24 basepairs long non-coding RNA molecules in plants...
Face membership authentication using SVM classification tree generated by membership-based LLE data partition
This paper presents a new membership authentication method by face classification using a support...
Incremental learning in autonomous systems: Evolving connectionist systems for on-line image and speech recognition
The paper presents an integrated approach to incremental learning in autonomous systems, that...
Incremental linear discriminant analysis for classification of data streams
This paper presents a constructive method for deriving an updated discriminant eigenspace for...
Constructing SVM multiple tree for face membership authentication
In membership authentication problem that has a complicated and mixed data distribution, the...
Dynamic neuro-fuzzy inference and statistical models for risk analysis of pest insect establishment
The paper introduces a statistical model and a DENFIS-based model for estimating the potential...
One-pass incremental membership authentication by face classification
Real membership authentication applications require machines to learn from stream data while...
Constructing support vector machine ensemble
Even the support vector machine (SVM) has been proposed to provide a good generalization...
Membership authentication in the dynamic group by face classification using SVM ensemble
This paper presents a method for authenticating an individual's membership in a dynamic group...