Search Keywords

Results Restricted To:

https://www.temple.edu

Total Results: 1,090

DeepIDPS: An Adaptive DRL-based Intrusion Detection and Prevention ...

https://cis.temple.edu/~jiewu/research/publications/Publication_files/ICC2024.pdf

Abstract—Most intrusion detection systems (IDS) are vul-nerable to novel attacks and struggle to maintain a balance between high accuracy and a low false positive rate. Furthermore, the relevant features of Distributed Denial of Service (DDoS) attacks in conventional networks may not necessarily apply to the Software-defined network (SDN) environment. Additionally, weak feature selection ...

JOURNAL OF LA Privacy Preserving Ranked Multi-Keyword Search for ...

https://cis.temple.edu/~wu/research/publications/Publication_files/zhangweitc.pdf

Abstract—With the advent of cloud computing, it has become increasingly popular for data owners to outsource their data to public cloud servers while allowing data users to retrieve this data. For privacy concerns, secure searches over encrypted cloud data has motivated several research works under the single owner model. However, most cloud servers in practice do not just serve one owner ...

FISSIONE: A Scalable Constant Degree and Low ... - Temple University

https://cis.temple.edu/~jiewu/research/publications/Publication_files/FissionE_infocom%20t2.pdf

The core component of many P2P systems is a distributed hash table (DHT) scheme [3], [4] that uses a hash-table-like interface to publish and look up data objects. In DHT schemes, the objects are hashed into a namespace, and each peer is assigned a small segment of the namespace. When peers join or depart, the responsibility is reassigned among the peers to maintain the hash table structure ...

Edge-Cloud Networks for Efficient AI/ML Implementations

https://cis.temple.edu/~wu/research/publications/Publication_files/Cloudnet-2023-final.pdf

Three-stage collaborative pipeline and offloading ¡ Local, communication, remote (Cloud)

CENTAUR WARFIGHTING: THE FALSE CHOICE OF HUMANS VS. AUTOMATION - Sites

https://sites.temple.edu/ticlj/files/2017/02/30.1.Scharre-TICLJ.pdf

Paul Scharre* Much of the debate on autonomous weapons presumes a choice between human versus autonomous decision-making over targeting and engagement decisions. In fact, in many situations, human-machine teaming in engagement decisions will not only be possible but preferable. Hybrid human-machine cognitive architectures will be able to leverage the precision and reliability of automation ...

The Conceptual Design of OpenNARS 3.1 - Temple University

https://cis.temple.edu/tagit/publications/PAGI-TR-11.pdf

October 19, 2020 NARS (Non-Axiomatic Reasoning System) can be analyzed in three parts [Wang, 1995, Wang, 2006, Wang, 2013]: