期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
A Survey of Deep Learning for Time Series Forecasting:Theories,Datasets,and State-of-the-Art Techniques
1
作者 Gaoyong Lu Yang Ou +5 位作者 Zhihong Wang Yingnan Qu Yingsheng Xia Dibin Tang Igor Kotenko Wei Li 《Computers, Materials & Continua》 2025年第11期2403-2441,共39页
Deep learning(DL)has revolutionized time series forecasting(TSF),surpassing traditional statistical methods(e.g.,ARIMA)and machine learning techniques in modeling complex nonlinear dynamics and long-term dependencies ... Deep learning(DL)has revolutionized time series forecasting(TSF),surpassing traditional statistical methods(e.g.,ARIMA)and machine learning techniques in modeling complex nonlinear dynamics and long-term dependencies prevalent in real-world temporal data.This comprehensive survey reviews state-of-the-art DL architectures forTSF,focusing on four core paradigms:(1)ConvolutionalNeuralNetworks(CNNs),adept at extracting localized temporal features;(2)Recurrent Neural Networks(RNNs)and their advanced variants(LSTM,GRU),designed for sequential dependency modeling;(3)Graph Neural Networks(GNNs),specialized for forecasting structured relational data with spatial-temporal dependencies;and(4)Transformer-based models,leveraging self-attention mechanisms to capture global temporal patterns efficiently.We provide a rigorous analysis of the theoretical underpinnings,recent algorithmic advancements(e.g.,TCNs,attention mechanisms,hybrid architectures),and practical applications of each framework,supported by extensive benchmark datasets(e.g.,ETT,traffic flow,financial indicators)and standardized evaluation metrics(MAE,MSE,RMSE).Critical challenges,including handling irregular sampling intervals,integrating domain knowledge for robustness,and managing computational complexity,are thoroughly discussed.Emerging research directions highlighted include diffusion models for uncertainty quantification,hybrid pipelines combining classical statistical and DL techniques for enhanced interpretability,quantile regression with Transformers for riskaware forecasting,and optimizations for real-time deployment.This work serves as an essential reference,consolidating methodological innovations,empirical resources,and future trends to bridge the gap between theoretical research and practical implementation needs for researchers and practitioners in the field. 展开更多
关键词 Time series forecasting deep learning TRANSFORMER neural network
在线阅读 下载PDF
Wireless Sensor Network Modeling and Analysis for Attack Detection
2
作者 Tamara Zhukabayeva Vasily Desnitsky Assel Abdildayeva 《Computer Modeling in Engineering & Sciences》 2025年第8期2591-2625,共35页
Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smar... Wireless Sensor Networks(WSN)have gained significant attention over recent years due to their extensive applications in various domains such as environmentalmonitoring,healthcare systems,industrial automation,and smart cities.However,such networks are inherently vulnerable to different types of attacks because they operate in open environments with limited resources and constrained communication capabilities.Thepaper addresses challenges related to modeling and analysis of wireless sensor networks and their susceptibility to attacks.Its objective is to create versatile modeling tools capable of detecting attacks against network devices and identifying anomalies caused either by legitimate user errors or malicious activities.A proposed integrated approach for data collection,preprocessing,and analysis in WSN outlines a series of steps applicable throughout both the design phase and operation stage.This ensures effective detection of attacks and anomalies within WSNs.An introduced attackmodel specifies potential types of unauthorized network layer attacks targeting network nodes,transmitted data,and services offered by the WSN.Furthermore,a graph-based analytical framework was designed to detect attacks by evaluating real-time events from network nodes and determining if an attack is underway.Additionally,a simulation model based on sequences of imperative rules defining behaviors of both regular and compromised nodes is presented.Overall,this technique was experimentally verified using a segment of a WSN embedded in a smart city infrastructure,simulating a wormhole attack.Results demonstrate the viability and practical significance of the technique for enhancing future information security measures.Validation tests confirmed high levels of accuracy and efficiency when applied specifically to detecting wormhole attacks targeting routing protocols in WSNs.Precision and recall rates averaged above the benchmark value of 0.95,thus validating the broad applicability of the proposed models across varied scenarios. 展开更多
关键词 Wireless sensor network MODELING SECURITY ATTACK DETECTION MONITORING
在线阅读 下载PDF
Enhancing Malware Detection Resilience:A U-Net GAN Denoising Framework for Image-Based Classification
3
作者 Huiyao Dong Igor Kotenko 《Computers, Materials & Continua》 2025年第3期4263-4285,共23页
The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new possibilities.Meanwhile,existing research has largely overlooked the impact o... The growing complexity of cyber threats requires innovative machine learning techniques,and image-based malware classification opens up new possibilities.Meanwhile,existing research has largely overlooked the impact of noise and obfuscation techniques commonly employed by malware authors to evade detection,and there is a critical gap in using noise simulation as a means of replicating real-world malware obfuscation techniques and adopting denoising framework to counteract these challenges.This study introduces an image denoising technique based on a U-Net combined with a GAN framework to address noise interference and obfuscation challenges in image-based malware analysis.The proposed methodology addresses existing classification limitations by introducing noise addition,which simulates obfuscated malware,and denoising strategies to restore robust image representations.To evaluate the approach,we used multiple CNN-based classifiers to assess noise resistance across architectures and datasets,measuring significant performance variation.Our denoising technique demonstrates remarkable performance improvements across two multi-class public datasets,MALIMG and BIG-15.For example,the MALIMG classification accuracy improved from 23.73%to 88.84%with denoising applied after Gaussian noise injection,demonstrating robustness.This approach contributes to improving malware detection by offering a robust framework for noise-resilient classification in noisy conditions. 展开更多
关键词 MALWARE CYBERSECURITY deep learning DENOISING
在线阅读 下载PDF
Modelling user notifcation scenarios in privacy policies
4
作者 Mikhail Kuznetsov Evgenia Novikova Igor Kotenko 《Cybersecurity》 2025年第4期20-56,共37页
The processing of personal data gives a rise to many privacy concerns,and one of them is to ensure the transpar-ency of data processing to end users.Usually this information is communicated to them using privacy polic... The processing of personal data gives a rise to many privacy concerns,and one of them is to ensure the transpar-ency of data processing to end users.Usually this information is communicated to them using privacy policies.In this paper,the problem of user notifcation in case of data breaches and policy changes is addressed,besides an ontol-ogy-based approach to model them is proposed.To specify the ontology concepts and properties,the requirements and recommendations for the legislative regulations as well as existing privacy policies are evaluated.A set of SPARQL queries to validate the correctness and completeness of the proposed ontology are developed.The proposed approach is applied to evaluate the privacy policies designed by cloud computing providers and IoT device manu-facturers.The results of the analysis show that the transparency of user notifcation scenarios presented in the privacy policies is still very low,and the companies should reconsider the notifcation mechanisms and provide more detailed information in privacy policies. 展开更多
关键词 Privacy policy Formal representation ONTOLOGY Personal data Data processor obligation Data breach Policy change
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部