An Overview of Deep Learning Techniques for Big Data IoT Applications
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur +2 more
wiley +1 more source
Localized Query Attack Toward Transformer-Based Visible Object Detectors. [PDF]
Wang Y, Li A, Yang Z, Liu X.
europepmc +1 more source
Threats and vulnerabilities in artificial intelligence and agentic AI models. [PDF]
Radanliev P, Santos O, Maple C.
europepmc +1 more source
A Spatially Distributed Perturbation Strategy with Smoothed Gradient Sign Method for Adversarial Analysis of Image Classification Systems. [PDF]
Xu Y, Li J, Chang D, Dong Y.
europepmc +1 more source
Visual security defense for industrial inspection based on computer vision. [PDF]
Jiang Z, Yuan H, Zeng C, Fu L.
europepmc +1 more source
Strong Target Attack on Hypergraph Neural Networks via Label Poisoning and Structure Modification. [PDF]
Huang J, Sun Q, Zhang N, Zheng M.
europepmc +1 more source
Evaluating gait system vulnerabilities through PPO and GAN-generated adversarial attacks. [PDF]
Saoudi EM, Jaafari J, Jai Andaloussi S.
europepmc +1 more source
Generative Adversarial Networks for Intrusion Detection Systems: A Comprehensive Survey of Applications, Challenges, and Research Directions. [PDF]
Alauthman M +4 more
europepmc +1 more source
Dialectal substitution as an adversarial approach for evaluating Arabic NLP robustness. [PDF]
Alshemali B.
europepmc +1 more source
Adversarial robust EEG-based brain-computer interfaces using a hierarchical convolutional neural network. [PDF]
Samuel J +5 more
europepmc +1 more source

