|
|
|
Lin Liu, Chenchen Li, Luzi Xiao and Guangwen Song
Both an offender?s home area and their daily activity area can impact the spatial distribution of crime. However, existing studies are generally limited to the influence of the offender?s home area and its immediate surrounding areas, while ignoring othe...
ver más
|
|
|
|
|
|
|
Mondher Bouazizi, Chuheng Zheng, Siyuan Yang and Tomoaki Ohtsuki
A growing focus among scientists has been on researching the techniques of automatic detection of dementia that can be applied to the speech samples of individuals with dementia. Leveraging the rapid advancements in Deep Learning (DL) and Natural Languag...
ver más
|
|
|
|
|
|
|
Maksym W. Sitnicki, Nataliia Prykaziuk, Humeniuk Ludmila, Olena Pimenowa, Florin Imbrea, Laura ?muleac and Raul Pa?calau
The digitalization of the agricultural industry is manifested through the active use of innovative technologies in all its areas. Agribusiness owners have to constantly improve their security to meet new challenges. In this context, the existing cyber ri...
ver más
|
|
|
|
|
|
|
Xie He, Arash Habibi Lashkari, Nikhill Vombatkere and Dilli Prasad Sharma
Over the past few decades, researchers have put their effort and paid significant attention to the authorship attribution field, as it plays an important role in software forensics analysis, plagiarism detection, security attack detection, and protection...
ver más
|
|
|
|
|
|
|
Hadeel Alrubayyi, Moudy Sharaf Alshareef, Zunaira Nadeem, Ahmed M. Abdelmoniem and Mona Jaber
The hype of the Internet of Things as an enabler for intelligent applications and related promise for ushering accessibility, efficiency, and quality of service is met with hindering security and data privacy concerns. It follows that such IoT systems, w...
ver más
|
|
|
|
|
|
|
Shaonan Hou, Chengjun Lin and Shaojun Yang
A transitive signature scheme enables anyone to obtain the signature on edge (??,??)
(
i
,
k
)
by combining the signatures on edges (??,??)
(
i
,
j
)
and (??,??)
(
j
,
k
)
, but it suffers from signature theft and signature abuse. The existing work has...
ver más
|
|
|
|
|
|
|
Xiaomin Jiang, Ziwan Zheng, Ye Zheng and Zhewei Mao
Theft is an inevitable problem in the context of urbanization and poses a challenge to people?s lives and social stability. The study of theft and criminal behavior using spatiotemporal, big, demographic, and neighborhood data is important for guiding se...
ver más
|
|
|
|
|
|
|
Yuefei Sun, Xianbo Sun, Tao Hu and Li Zhu
Despite the widespread use of artificial intelligence-based methods in detecting electricity theft by smart grid customers, current methods suffer from two main flaws: a limited amount of data on electricity theft customers compared to that on normal cus...
ver más
|
|
|
|
|
|
|
Dominik Molitor, Wullianallur Raghupathi, Aditya Saharia and Viju Raghupathi
While data breaches are a frequent and universal phenomenon, the characteristics and dimensions of data breaches are unexplored. In this novel exploratory research, we apply machine learning (ML) and text analytics to a comprehensive collection of data b...
ver más
|
|
|
|
|
|
|
Fu-Hau Hsu, Min-Hao Wu, Yan-Ling Hwang, Jian-Xin Chen, Jian-Hong Huang, Hao-Jyun Wang and Yi-Wen Lai
The number of Internet of Things (IoT) devices has increased dramatically in recent years, and Bluetooth technology is critical for communication between IoT devices. It is possible to protect electronic communications, the Internet of Things (IoT), and ...
ver más
|
|
|
|