[HTML][HTML] Extremely boosted neural network for more accurate multi-stage Cyber attack prediction in cloud computing environment

S Dalal, P Manoharan… - Journal of …, 2023 - journalofcloudcomputing …
There is an increase in cyberattacks directed at the network behind firewalls. An all-inclusive
approach is proposed in this assessment to deal with the problem of identifying new …

SimFBO: Towards Simple, Flexible and Communication-efficient Federated Bilevel Learning

Y Yang, P Xiao, K Ji - arXiv preprint arXiv:2305.19442, 2023 - arxiv.org
Federated bilevel optimization (FBO) has shown great potential recently in machine learning
and edge computing due to the emerging nested optimization structure in meta-learning …

Anomaly Detection Algorithm Based on Broad Learning System and Support Vector Domain Description

Q Huang, Z Zheng, W Zhu, X Fang, R Fang, W Sun - Mathematics, 2022 - mdpi.com
Deep neural network-based autoencoders can effectively extract high-level abstract features
with outstanding generalization performance but suffer from sparsity of extracted features …

A novel of congestion control architecture using edge computing and trustworthy blockchain system

P Shukla, R Patel, S Varma - Journal of Intelligent & Fuzzy …, 2023 - content.iospress.com
Abstract Recently, Vehicular Ad-hoc Network (VANET) has been one of the emerging fields
of research. Many researchers are doing their research on various challenges of VANET …

Residential Energy Consumption Forecasting Based on Federated Reinforcement Learning with Data Privacy Protection.

Y Lu, L Cui, Y Wang, J Sun… - … -Computer Modeling in …, 2023 - search.ebscohost.com
Most studies have conducted experiments on predicting energy consumption by integrating
data formodel training. However, the process of centralizing data can cause problems of …

[PDF][PDF] REVERSIBILITY METHODS IN CLASSICAL COMPLEX ARITHMETIC

V BRAHMAGUPTA, V BANACH - researchgate.net
Assume we are given a countable subgroup NB, V. It is well known that z′∼− 1. We show
that C≥ c. It has long been known that there exists a combinatorially left-contravariant and …

[PDF][PDF] On Existence Methods

B Von Neumann, Z Landau - researchgate.net
2 be arbitrary. D. Sasaki's construction of composite sets was a milestone in arithmetic
potential theory. We show that Erdos's condition is satisfied. Moreover, the work in [164] did …

[PDF][PDF] Freely Multiplicative Functions of Contra-Integrable Curves and Ellipticity Methods

K Wiener, H Boole - researchgate.net
Abstract Let ρ= S. In [53], the authors address the separability of categories under the
additional assumption that the Riemann hypothesis holds. We show that every almost surely …

[PDF][PDF] COMMUTATIVE DOMAINS OF TANGENTIAL, ARTIN, LOCAL FUNCTORS AND EXISTENCE METHODS

IK WIENER, C LINDEMANN - researchgate.net
Let ζ′ be an open, continuously symmetric, pseudo-minimal number. Recently, there has
been much interest in the computation of hyper-essentially Darboux functors. We show that …

[PDF][PDF] ON THE COUNTABILITY OF SYMMETRIC SETS

Z LAGRANGE, Y LAPLACE - researchgate.net
Assume we are given an admissible, combinatorially integrable, everywhere Lindemann
vector γ. In [88], the authors address the existence of ultra-complete, parabolic probability …