High-Confidence Computing最新文献

筛选
英文 中文
LSTM stock prediction model based on blockchain 基于区块链的LSTM库存预测模型
IF 3
High-Confidence Computing Pub Date : 2025-03-17 DOI: 10.1016/j.hcc.2025.100316
Yongdan Wang , Haibin Zhang , Baohan Huang , Zhijun Lin , Chuan Pang
{"title":"LSTM stock prediction model based on blockchain","authors":"Yongdan Wang ,&nbsp;Haibin Zhang ,&nbsp;Baohan Huang ,&nbsp;Zhijun Lin ,&nbsp;Chuan Pang","doi":"10.1016/j.hcc.2025.100316","DOIUrl":"10.1016/j.hcc.2025.100316","url":null,"abstract":"<div><div>The stock market is a vital component of the financial sector. Due to the inherent uncertainty and volatility of the stock market, stock price prediction has always been both intriguing and challenging. To improve the accuracy of stock predictions, we construct a model that integrates investor sentiment with Long Short-Term Memory (LSTM) networks. By extracting sentiment data from the “Financial Post” and quantifying it with the Vader sentiment lexicon, we add a sentiment index to improve stock price forecasting. We combine sentiment factors with traditional trading indicators, making predictions more accurate. Furthermore, we deploy our system on the blockchain to enhance data security, reduce the risk of malicious attacks, and improve system robustness. This integration of sentiment analysis and blockchain offers a novel approach to stock market predictions, providing secure and reliable decision support for investors and financial institutions. We deploy our system and demonstrate that our system is both efficient and practical. For 312 bytes of stock data, we achieve a latency of 434.42 ms with one node and 565.69 ms with five nodes. For 1700 bytes of sentiment data, we achieve a latency of 1405.25 ms with one node and 1750.25 ms with five nodes.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100316"},"PeriodicalIF":3.0,"publicationDate":"2025-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145266604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Block-chain abnormal transaction detection method based on generative adversarial network and autoencoder 基于生成对抗网络和自编码器的区块链异常交易检测方法
IF 3
High-Confidence Computing Pub Date : 2025-03-03 DOI: 10.1016/j.hcc.2025.100313
Ao Xiong , Chenbin Qiao , Wenjing Li , Dong Wang , Da Li , Bo Gao , Weixian Wang
{"title":"Block-chain abnormal transaction detection method based on generative adversarial network and autoencoder","authors":"Ao Xiong ,&nbsp;Chenbin Qiao ,&nbsp;Wenjing Li ,&nbsp;Dong Wang ,&nbsp;Da Li ,&nbsp;Bo Gao ,&nbsp;Weixian Wang","doi":"10.1016/j.hcc.2025.100313","DOIUrl":"10.1016/j.hcc.2025.100313","url":null,"abstract":"<div><div>Anomaly detection in blockchain transactions faces several challenges, the most prominent being the imbalance between positive and negative samples. Most transaction data are normal, with only a small fraction of anomalous data. Additionally, blockchain transaction datasets tend to be small and often incomplete, which complicates the process of anomaly detection. When using simple AI models, selecting the appropriate model and tuning parameters becomes difficult, resulting in poor performance. To address these issues, this paper proposes GANAnomaly, an anomaly detection model based on Generative Adversarial Networks (GANs) and Autoencoders. The model consists of three components: a data generation model, an encoding model, and a detection model. Firstly, the Wasserstein GAN (WGAN) is employed as the data generation model. The generated data is then used to train an encoding model that performs feature extraction and dimensionality reduction. Finally, the trained encoder serves as the feature extractor for the detection model. This approach leverages GANs to mitigate the challenges of low data volume and data imbalance, while the encoder extracts relevant features and reduces dimensionality. Experimental results demonstrate that the proposed anomaly detection model outperforms traditional methods by more accurately identifying anomalous blockchain transactions, reducing the false positive rate, and improving both accuracy and efficiency.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100313"},"PeriodicalIF":3.0,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145158370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Task migration with deadlines using machine learning-based dwell time prediction in vehicular micro clouds 基于机器学习的车辆微云停留时间预测的任务迁移
IF 3.2
High-Confidence Computing Pub Date : 2025-03-03 DOI: 10.1016/j.hcc.2025.100314
Ziqi Zhou , Agon Memedi , Chunghan Lee , Seyhan Ucar , Onur Altintas , Falko Dressler
{"title":"Task migration with deadlines using machine learning-based dwell time prediction in vehicular micro clouds","authors":"Ziqi Zhou ,&nbsp;Agon Memedi ,&nbsp;Chunghan Lee ,&nbsp;Seyhan Ucar ,&nbsp;Onur Altintas ,&nbsp;Falko Dressler","doi":"10.1016/j.hcc.2025.100314","DOIUrl":"10.1016/j.hcc.2025.100314","url":null,"abstract":"<div><div>Edge computing is becoming ever more relevant to offload compute-heavy tasks in vehicular networks. In this context, the concept of vehicular micro clouds (VMCs) has been proposed to use compute and storage resources on nearby vehicles to complete computational tasks. As many tasks in this application domain are time critical, offloading to the cloud is prohibitive. Additionally, task deadlines have to be dealt with. This paper addresses two main challenges. First, we present a task migration algorithm supporting deadlines in vehicular edge computing. The algorithm is following the earliest deadline first model but in presence of dynamic processing resources, <em>i.e</em>, vehicles joining and leaving a VMC. This task offloading is very sensitive to the mobility of vehicles in a VMC, <em>i.e</em>, the so-called dwell time a vehicles spends in the VMC. Thus, secondly, we propose a machine learning-based solution for dwell time prediction. Our dwell time prediction model uses a random forest approach to estimate how long a vehicle will stay in a VMC. Our approach is evaluated using mobility traces of an artificial simple intersection scenario as well as of real urban traffic in cities of Luxembourg and Nagoya. Our proposed approach is able to realize low-delay and low-failure task migration in dynamic vehicular conditions, advancing the state of the art in vehicular edge computing.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 2","pages":"Article 100314"},"PeriodicalIF":3.2,"publicationDate":"2025-03-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143891463","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical federated transfer learning in digital twin-based vehicular networks 基于数字孪生的车辆网络中的分层联邦迁移学习
IF 3
High-Confidence Computing Pub Date : 2025-02-28 DOI: 10.1016/j.hcc.2025.100303
Qasim Zia , Saide Zhu , Haoxin Wang , Zafar Iqbal , Yingshu Li
{"title":"Hierarchical federated transfer learning in digital twin-based vehicular networks","authors":"Qasim Zia ,&nbsp;Saide Zhu ,&nbsp;Haoxin Wang ,&nbsp;Zafar Iqbal ,&nbsp;Yingshu Li","doi":"10.1016/j.hcc.2025.100303","DOIUrl":"10.1016/j.hcc.2025.100303","url":null,"abstract":"<div><div>In recent research on the Digital Twin-based Vehicular Ad hoc Network (DT-VANET), Federated Learning (FL) has shown its ability to provide data privacy. However, Federated learning struggles to adequately train a global model when confronted with data heterogeneity and data sparsity among vehicles, which ensure suboptimal accuracy in making precise predictions for different vehicle types. To address these challenges, this paper combines Federated Transfer Learning (FTL) to conduct vehicle clustering related to types of vehicles and proposes a novel Hierarchical Federated Transfer Learning (HFTL). We construct a framework for DT-VANET, along with two algorithms designed for cloud server model updates and intra-cluster federated transfer learning, to improve the accuracy of the global model. In addition, we developed a data quality score-based mechanism to prevent the global model from being affected by malicious vehicles. Lastly, detailed experiments on real-world datasets are conducted, considering different performance metrics that verify the effectiveness and efficiency of our algorithm.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100303"},"PeriodicalIF":3.0,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145105830","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On protecting the data privacy of Large Language Models (LLMs) and LLM agents: A literature review 大型语言模型(LLM)及其代理的数据隐私保护:文献综述
IF 3.2
High-Confidence Computing Pub Date : 2025-02-28 DOI: 10.1016/j.hcc.2025.100300
Biwei Yan , Kun Li , Minghui Xu , Yueyan Dong , Yue Zhang , Zhaochun Ren , Xiuzhen Cheng
{"title":"On protecting the data privacy of Large Language Models (LLMs) and LLM agents: A literature review","authors":"Biwei Yan ,&nbsp;Kun Li ,&nbsp;Minghui Xu ,&nbsp;Yueyan Dong ,&nbsp;Yue Zhang ,&nbsp;Zhaochun Ren ,&nbsp;Xiuzhen Cheng","doi":"10.1016/j.hcc.2025.100300","DOIUrl":"10.1016/j.hcc.2025.100300","url":null,"abstract":"<div><div>Large Language Models (LLMs) are complex artificial intelligence systems, which can understand, generate, and translate human languages. By analyzing large amounts of textual data, these models learn language patterns to perform tasks such as writing, conversation, and summarization. Agents built on LLMs (LLM agents) further extend these capabilities, allowing them to process user interactions and perform complex operations in diverse task environments. However, during the processing and generation of massive data, LLMs and LLM agents pose a risk of sensitive information leakage, potentially threatening data privacy. This paper aims to demonstrate data privacy issues associated with LLMs and LLM agents to facilitate a comprehensive understanding. Specifically, we conduct an in-depth survey about privacy threats, encompassing passive privacy leakage and active privacy attacks. Subsequently, we introduce the privacy protection mechanisms employed by LLMs and LLM agents and provide a detailed analysis of their effectiveness. Finally, we explore the privacy protection challenges for LLMs and LLM agents as well as outline potential directions for future developments in this domain.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 2","pages":"Article 100300"},"PeriodicalIF":3.2,"publicationDate":"2025-02-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143859303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Accelerating decentralized federated learning via momentum GD with heterogeneous delays 通过具有异构延迟的动量GD加速分散联邦学习
IF 3
High-Confidence Computing Pub Date : 2025-02-26 DOI: 10.1016/j.hcc.2025.100310
Na Li , Hangguan Shan , Meiyan Song , Yong Zhou , Zhongyuan Zhao , Howard H. Yang , Fen Hou
{"title":"Accelerating decentralized federated learning via momentum GD with heterogeneous delays","authors":"Na Li ,&nbsp;Hangguan Shan ,&nbsp;Meiyan Song ,&nbsp;Yong Zhou ,&nbsp;Zhongyuan Zhao ,&nbsp;Howard H. Yang ,&nbsp;Fen Hou","doi":"10.1016/j.hcc.2025.100310","DOIUrl":"10.1016/j.hcc.2025.100310","url":null,"abstract":"<div><div>Federated learning (FL) with synchronous model aggregation suffers from the straggler issue because of heterogeneous transmission and computation delays among different agents. In mobile wireless networks, this issue is exacerbated by time-varying network topology due to agent mobility. Although asynchronous FL can alleviate straggler issues, it still faces critical challenges in terms of algorithm design and convergence analysis because of dynamic information update delay (IU-Delay) and dynamic network topology. To tackle these challenges, we propose a decentralized FL framework based on gradient descent with momentum, named decentralized momentum federated learning (DMFL). We prove that DMFL is globally convergent on convex loss functions under the bounded time-varying IU-Delay, as long as the network topology is uniformly jointly strongly connected. Moreover, DMFL does not impose any restrictions on the data distribution over agents. Extensive experiments are conducted to verify DMFL’s performance superiority over the benchmarks and to reveal the effects of diverse parameters on the performance of the proposed algorithm.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 4","pages":"Article 100310"},"PeriodicalIF":3.0,"publicationDate":"2025-02-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145266603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
FedViTBloc: Secure and privacy-enhanced medical image analysis with federated vision transformer and blockchain FedViTBloc:使用联合视觉变压器和区块链的安全和隐私增强的医学图像分析
IF 3
High-Confidence Computing Pub Date : 2025-02-15 DOI: 10.1016/j.hcc.2025.100302
Gabriel Chukwunonso Amaizu , Akshita Maradapu Vera Venkata Sai , Sanjay Bhardwaj , Dong-Seong Kim , Madhuri Siddula , Yingshu Li
{"title":"FedViTBloc: Secure and privacy-enhanced medical image analysis with federated vision transformer and blockchain","authors":"Gabriel Chukwunonso Amaizu ,&nbsp;Akshita Maradapu Vera Venkata Sai ,&nbsp;Sanjay Bhardwaj ,&nbsp;Dong-Seong Kim ,&nbsp;Madhuri Siddula ,&nbsp;Yingshu Li","doi":"10.1016/j.hcc.2025.100302","DOIUrl":"10.1016/j.hcc.2025.100302","url":null,"abstract":"<div><div>The increasing prevalence of cancer necessitates advanced methodologies for early detection and diagnosis. Early intervention is crucial for improving patient outcomes and reducing the overall burden on healthcare systems. Traditional centralized methods of medical image analysis pose significant risks to patient privacy and data security, as they require the aggregation of sensitive information in a single location. Furthermore, these methods often suffer from limitations related to data diversity and scalability, hindering the development of universally robust diagnostic models. Recent advancements in machine learning, particularly deep learning, have shown promise in enhancing medical image analysis. However, the need to access large and diverse datasets for training these models introduces challenges in maintaining patient confidentiality and adhering to strict data protection regulations. This paper introduces FedViTBloc, a secure and privacy-enhanced framework for medical image analysis utilizing Federated Learning (FL) combined with Vision Transformers (ViT) and blockchain technology. The proposed system ensures patient data privacy and security through fully homomorphic encryption and differential privacy techniques. By employing a decentralized FL approach, multiple medical institutions can collaboratively train a robust deep-learning model without sharing raw data. Blockchain integration further enhances the security and trustworthiness of the FL process by managing client registration and ensuring secure onboarding of participants. Experimental results demonstrate the effectiveness of FedViTBloc in medical image analysis while maintaining stringent privacy standards, achieving 67% accuracy and reducing loss below 2 across 10 clients, ensuring scalability and robustness.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 3","pages":"Article 100302"},"PeriodicalIF":3.0,"publicationDate":"2025-02-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144860301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT 一种改进的工业物联网安全指定服务器无证书认证可搜索加密方案
IF 3
High-Confidence Computing Pub Date : 2025-02-12 DOI: 10.1016/j.hcc.2025.100301
Le Zhang , Feng Zhou , Qijia Zhang , Wei Xiong , Youliang Tian
{"title":"An improved secure designated server certificateless authenticated searchable encryption scheme for IIoT","authors":"Le Zhang ,&nbsp;Feng Zhou ,&nbsp;Qijia Zhang ,&nbsp;Wei Xiong ,&nbsp;Youliang Tian","doi":"10.1016/j.hcc.2025.100301","DOIUrl":"10.1016/j.hcc.2025.100301","url":null,"abstract":"<div><div>The Industrial Internet of Things (IIoT) achieves the automation, monitoring, and optimization of industrial processes by interconnecting various sensors, smart devices, and the Internet, which dramatically increases productivity and product quality. Nevertheless, the IIoT comprises a substantial amount of sensitive data, which requires encryption to ensure data privacy and security. Recently, Sun et al. proposed a certificateless searchable encryption scheme for IIoT to enable the retrieval of ciphertext data while protecting data privacy. However, we found that their scheme not only fails to satisfy trapdoor indistinguishability but also lacks defense against keyword guessing attacks. In addition, some schemes use deterministic algorithms in the encryption process, resulting in the same ciphertexts after encryption for the same keyword, thereby leaking the potential frequency distribution of the keyword in the ciphertext space, thereby leaking the potential frequency distribution of the keyword in the ciphertext space, allowing attackers to infer the plaintext information corresponding to the ciphertext through statistical analysis. To better protect data privacy, we propose an improved certificateless searchable encryption scheme with a designated server. With security analysis, we prove that our scheme provides multi-ciphertext indistinguishability and multi-trapdoor indistinguishability security under the random oracle. Experimental results show that the proposed scheme has good overall performance in terms of computational overhead, communication overhead, and security features.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 3","pages":"Article 100301"},"PeriodicalIF":3.0,"publicationDate":"2025-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144725020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Reinforcement learning for an efficient and effective malware investigation during cyber incident response 强化学习在网络事件响应过程中高效和有效的恶意软件调查
IF 3
High-Confidence Computing Pub Date : 2025-01-17 DOI: 10.1016/j.hcc.2025.100299
Dipo Dunsin , Mohamed Chahine Ghanem , Karim Ouazzane , Vassil Vassilev
{"title":"Reinforcement learning for an efficient and effective malware investigation during cyber incident response","authors":"Dipo Dunsin ,&nbsp;Mohamed Chahine Ghanem ,&nbsp;Karim Ouazzane ,&nbsp;Vassil Vassilev","doi":"10.1016/j.hcc.2025.100299","DOIUrl":"10.1016/j.hcc.2025.100299","url":null,"abstract":"<div><div>The ever-escalating prevalence of malware is a serious cybersecurity threat, often requiring advanced post-incident forensic investigation techniques. This paper proposes a framework to enhance malware forensics by leveraging reinforcement learning (RL). The approach combines heuristic and signature-based methods, supported by RL through a unified MDP model, which breaks down malware analysis into distinct states and actions. This optimisation enhances the identification and classification of malware variants. The framework employs Q-learning and other techniques to boost the speed and accuracy of detecting new and unknown malware, outperforming traditional methods. We tested the experimental framework across multiple virtual environments infected with various malware types. The RL agent collected forensic evidence and improved its performance through Q-tables and temporal difference learning. The epsilon-greedy exploration strategy, in conjunction with Q-learning updates, effectively facilitated transitions. The learning rate depended on the complexity of the MDP environment: higher in simpler ones for quicker convergence and lower in more complex ones for stability. This RL-enhanced model significantly reduced the time required for post-incident malware investigations, achieving a high accuracy rate of 94<span><math><mtext>%</mtext></math></span> in identifying malware. These results indicate RL’s potential to revolutionise post-incident forensics investigations in cybersecurity. Future work will incorporate more advanced RL algorithms and large language models (LLMs) to further enhance the effectiveness of malware forensic analysis.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 3","pages":"Article 100299"},"PeriodicalIF":3.0,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144827309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced Meta-IDS: Adaptive multi-stage IDS with sequential model adjustments 增强元IDS:自适应多阶段IDS与顺序模型调整
IF 3.2
High-Confidence Computing Pub Date : 2025-01-15 DOI: 10.1016/j.hcc.2025.100298
Nadia Niknami , Vahid Mahzoon , Slobadan Vucetic , Jie Wu
{"title":"Enhanced Meta-IDS: Adaptive multi-stage IDS with sequential model adjustments","authors":"Nadia Niknami ,&nbsp;Vahid Mahzoon ,&nbsp;Slobadan Vucetic ,&nbsp;Jie Wu","doi":"10.1016/j.hcc.2025.100298","DOIUrl":"10.1016/j.hcc.2025.100298","url":null,"abstract":"<div><div>Traditional single-machine Network Intrusion Detection Systems (NIDS) are increasingly challenged by rapid network traffic growth and the complexities of advanced neural network methodologies. To address these issues, we propose an <em>Enhanced Meta-IDS</em> framework inspired by meta-computing principles, enabling dynamic resource allocation for optimized NIDS performance. Our hierarchical architecture employs a three-stage approach with iterative feedback mechanisms. We leverage these intervals in real-world scenarios with intermittent data batches to enhance our models. Outputs from the third stage provide labeled samples back to the first and second stages, allowing retraining and fine-tuning based on the most recent results without incurring additional latency. By dynamically adjusting model parameters and decision boundaries, our system optimizes responses to real-time data, effectively balancing computational efficiency and detection accuracy. By ensuring that only the most suspicious data points undergo intensive analysis, our multi-stage framework optimizes computational resource usage. Experiments on benchmark datasets demonstrate that our <em>Enhanced Meta-IDS</em> improves detection accuracy and reduces computational load or CPU time, ensuring robust performance in high-traffic environments. This adaptable approach offers an effective solution to modern network security challenges.</div></div>","PeriodicalId":100605,"journal":{"name":"High-Confidence Computing","volume":"5 3","pages":"Article 100298"},"PeriodicalIF":3.2,"publicationDate":"2025-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144713063","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信