IoT devices implement firmware update mechanisms to fix security issues and deploy new features. These mechanisms are often triggered and mediated by mobile companion apps …
X Wang, Y Qiao, J Xiong, Z Zhao… - Journal of Theory …, 2024 - centuryscipub.com
In today's digital era, the security of networked systems is of utmost importance amidst the increasing prevalence of cyber threats and sophisticated intrusion techniques. This paper …
X Jin, Y Wang - arXiv preprint arXiv:2303.12135, 2023 - arxiv.org
The growth of pending legal cases in populous countries, such as India, has become a major issue. Developing effective techniques to process and understand legal documents is …
F Ni, H Zang, Y Qiao - … in education: prospects and challenges of …, 2024 - books.google.com
In the fast-moving field of Industry 4.0, active equipment maintenance is becoming increasingly critical. This article introduces an innovative solution called SmartFix that …
The rampant occurrence of cybersecurity breaches imposes substantial limitations on the progress of network infrastructures, leading to compromised data, financial losses, potential …
J Xiong, M Feng, X Wang, C Jiang… - Journal of Theory and …, 2024 - centuryscipub.com
In the era of the COVID-19 pandemic, the surge in information sharing on social media, particularly Twitter, necessitates a nuanced understanding of sentiments. Conventional …
This systematic literature review comprehensively examines the application of Large Language Models (LLMs) in forecasting and anomaly detection, highlighting the current …
J Zhuang - Companion Proceedings of the ACM on Web …, 2024 - dl.acm.org
Over the past decades, text classification underwent remarkable evolution across diverse domains. Despite these advancements, most existing model-centric methods in text …
The number of" smart''devices, that is, devices making up the Internet of Things (IoT), is steadily growing. They suffer from vulnerabilities just as other software and hardware …