3,357 research outputs found

    Artificial intelligence in the cyber domain: Offense and defense

    Get PDF
    Artificial intelligence techniques have grown rapidly in recent years, and their applications in practice can be seen in many fields, ranging from facial recognition to image analysis. In the cybersecurity domain, AI-based techniques can provide better cyber defense tools and help adversaries improve methods of attack. However, malicious actors are aware of the new prospects too and will probably attempt to use them for nefarious purposes. This survey paper aims at providing an overview of how artificial intelligence can be used in the context of cybersecurity in both offense and defense.Web of Science123art. no. 41

    Malware Detection in Internet of Things (IoT) Devices Using Deep Learning

    Get PDF
    Internet of Things (IoT) devices usage is increasing exponentially with the spread of the internet. With the increasing capacity of data on IoT devices, these devices are becoming venerable to malware attacks; therefore, malware detection becomes an important issue in IoT devices. An effective, reliable, and time-efficient mechanism is required for the identification of sophisticated malware. Researchers have proposed multiple methods for malware detection in recent years, however, accurate detection remains a challenge. We propose a deep learning-based ensemble classification method for the detection of malware in IoT devices. It uses a three steps approach; in the first step, data is preprocessed using scaling, normalization, and de-noising, whereas in the second step, features are selected and one hot encoding is applied followed by the ensemble classifier based on CNN and LSTM outputs for detection of malware. We have compared results with the state-of-the-art methods and our proposed method outperforms the existing methods on standard datasets with an average accuracy of 99.5%.publishedVersio

    Incremental construction of LSTM recurrent neural network

    Get PDF
    Long Short--Term Memory (LSTM) is a recurrent neural network that uses structures called memory blocks to allow the net remember significant events distant in the past input sequence in order to solve long time lag tasks, where other RNN approaches fail. Throughout this work we have performed experiments using LSTM networks extended with growing abilities, which we call GLSTM. Four methods of training growing LSTM has been compared. These methods include cascade and fully connected hidden layers as well as two different levels of freezing previous weights in the cascade case. GLSTM has been applied to a forecasting problem in a biomedical domain, where the input/output behavior of five controllers of the Central Nervous System control has to be modelled. We have compared growing LSTM results against other neural networks approaches, and our work applying conventional LSTM to the task at hand.Postprint (published version

    Managing extreme cryptocurrency volatility in algorithmic trading: EGARCH via genetic algorithms and neural networks.

    Get PDF
    Política de acceso abierto tomada de: https://www.aimspress.com/index/news/solo-detail/openaccesspolicyThe blockchain ecosystem has seen a huge growth since 2009, with the introduction of Bitcoin, driven by conceptual and algorithmic innovations, along with the emergence of numerous new cryptocurrencies. While significant attention has been devoted to established cryptocurrencies like Bitcoin and Ethereum, the continuous introduction of new tokens requires a nuanced examination. In this article, we contribute a comparative analysis encompassing deep learning and quantum methods within neural networks and genetic algorithms, incorporating the innovative integration of EGARCH (Exponential Generalized Autoregressive Conditional Heteroscedasticity) into these methodologies. In this study, we evaluated how well Neural Networks and Genetic Algorithms predict “buy” or “sell” decisions for different cryptocurrencies, using F1 score, Precision, and Recall as key metrics. Our findings underscored the Adaptive Genetic Algorithm with Fuzzy Logic as the most accurate and precise within genetic algorithms. Furthermore, neural network methods, particularly the Quantum Neural Network, demonstrated noteworthy accuracy. Importantly, the X2Y2 cryptocurrency consistently attained the highest accuracy levels in both methodologies, emphasizing its predictive strength. Beyond aiding in the selection of optimal trading methodologies, we introduced the potential of EGARCH integration to enhance predictive capabilities, offering valuable insights for reducing risks associated with investing in nascent cryptocurrencies amidst limited historical market data. This research provides insights for investors, regulators, and developers in the cryptocurrency market. Investors can utilize accurate predictions to optimize investment decisions, regulators may consider implementing guidelines to ensure fairness, and developers play a pivotal role in refining neural network models for enhanced analysis.This research was funded by the Universitat de Barcelona, under the grant UB-AE-AS017634

    Robotic ubiquitous cognitive ecology for smart homes

    Get PDF
    Robotic ecologies are networks of heterogeneous robotic devices pervasively embedded in everyday environments, where they cooperate to perform complex tasks. While their potential makes them increasingly popular, one fundamental problem is how to make them both autonomous and adaptive, so as to reduce the amount of preparation, pre-programming and human supervision that they require in real world applications. The project RUBICON develops learning solutions which yield cheaper, adaptive and efficient coordination of robotic ecologies. The approach we pursue builds upon a unique combination of methods from cognitive robotics, machine learning, planning and agent- based control, and wireless sensor networks. This paper illustrates the innovations advanced by RUBICON in each of these fronts before describing how the resulting techniques have been integrated and applied to a smart home scenario. The resulting system is able to provide useful services and pro-actively assist the users in their activities. RUBICON learns through an incremental and progressive approach driven by the feed- back received from its own activities and from the user, while also self-organizing the manner in which it uses available sensors, actuators and other functional components in the process. This paper summarises some of the lessons learned by adopting such an approach and outlines promising directions for future work
    corecore