3,357 research outputs found
Artificial intelligence in the cyber domain: Offense and defense
Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.Web of Science123art. no. 41
Malware Detection in Internet of Things (IoT) Devices Using Deep Learning
Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. An effective, reliable, and time-efficient mechanism is required for the identification of sophisticated malware. Researchers have proposed multiple methods for malware detection in recent years, however, accurate detection remains a challenge. We propose a deep learning-based ensemble classification method for the detection of malware in IoT devices. It uses a three steps approach; in the first step, data is preprocessed using scaling, normalization, and de-noising, whereas in the second step, features are selected and one hot encoding is applied followed by the ensemble classifier based on CNN and LSTM outputs for detection of malware. We have compared results with the state-of-the-art methods and our proposed method outperforms the existing methods on standard datasets with an average accuracy of 99.5%.publishedVersio
Incremental construction of LSTM recurrent neural network
Long Short--Term Memory (LSTM) is a recurrent neural network that
uses structures called memory blocks to allow the net remember
significant events distant in the past input sequence in order to
solve long time lag tasks, where other RNN approaches fail.
Throughout this work we have performed experiments using LSTM
networks extended with growing abilities, which we call GLSTM.
Four methods of training growing LSTM has been compared. These
methods include cascade and fully connected hidden layers as well
as two different levels of freezing previous weights in the
cascade case. GLSTM has been applied to a forecasting problem in a biomedical domain, where the input/output behavior of five
controllers of the Central Nervous System control has to be
modelled. We have compared growing LSTM results against other
neural networks approaches, and our work applying conventional
LSTM to the task at hand.Postprint (published version
Managing extreme cryptocurrency volatility in algorithmic trading: EGARCH via genetic algorithms and neural networks.
Política de acceso abierto tomada de: https://www.aimspress.com/index/news/solo-detail/openaccesspolicyThe blockchain ecosystem has seen a huge growth since 2009, with the introduction of
Bitcoin, driven by conceptual and algorithmic innovations, along with the emergence of numerous new
cryptocurrencies. While significant attention has been devoted to established cryptocurrencies like
Bitcoin and Ethereum, the continuous introduction of new tokens requires a nuanced examination. In
this article, we contribute a comparative analysis encompassing deep learning and quantum methods
within neural networks and genetic algorithms, incorporating the innovative integration of EGARCH
(Exponential Generalized Autoregressive Conditional Heteroscedasticity) into these methodologies. In
this study, we evaluated how well Neural Networks and Genetic Algorithms predict “buy” or “sell”
decisions for different cryptocurrencies, using F1 score, Precision, and Recall as key metrics. Our
findings underscored the Adaptive Genetic Algorithm with Fuzzy Logic as the most accurate and
precise within genetic algorithms. Furthermore, neural network methods, particularly the Quantum
Neural Network, demonstrated noteworthy accuracy. Importantly, the X2Y2 cryptocurrency
consistently attained the highest accuracy levels in both methodologies, emphasizing its predictive
strength. Beyond aiding in the selection of optimal trading methodologies, we introduced the potential
of EGARCH integration to enhance predictive capabilities, offering valuable insights for reducing
risks associated with investing in nascent cryptocurrencies amidst limited historical market data. This
research provides insights for investors, regulators, and developers in the cryptocurrency market.
Investors can utilize accurate predictions to optimize investment decisions, regulators may consider implementing guidelines to ensure fairness, and developers play a pivotal role in refining neural
network models for enhanced analysis.This research was funded by the Universitat de Barcelona, under the grant UB-AE-AS017634
Robotic ubiquitous cognitive ecology for smart homes
Robotic ecologies are networks of heterogeneous robotic devices pervasively embedded in everyday environments, where they cooperate to perform complex tasks. While their potential makes them increasingly popular, one fundamental problem is how to make them both autonomous and adaptive, so as to reduce the amount of preparation, pre-programming and human supervision that they require in real world applications. The project RUBICON develops learning solutions which yield cheaper, adaptive and efficient coordination of robotic ecologies. The approach we pursue builds upon a unique combination of methods from cognitive robotics, machine learning, planning and agent- based control, and wireless sensor networks. This paper illustrates the innovations advanced by RUBICON in each of these fronts before describing how the resulting techniques have been integrated and applied to a smart home scenario. The resulting system is able to provide useful services and pro-actively assist the users in their activities. RUBICON learns through an incremental and progressive approach driven by the feed- back received from its own activities and from the user, while also self-organizing the manner in which it uses available sensors, actuators and other functional components in the process. This paper summarises some of the lessons learned by adopting such an approach and outlines promising directions for future work
- …