Results 121 to 130 of about 16,308 (300)

AI‐Powered Anomaly Detection for Secure Internet of Things (IoT): Optimising XGBoost and Deep Learning With Bayesian Optimisation

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim   +4 more
wiley   +1 more source

Adversarial Halftone QR Code

open access: yesIEEE Access
Recent studies have shown that machine-learning models are vulnerable to adversarial attacks. Adversarial attacks are deliberate attempts to modify the input data of a machine learning model in a way that causes it to produce incorrect predictions.
Palakorn Kamnounsing   +3 more
doaj   +1 more source

Patch-wise++ Perturbation for Adversarial Targeted Attacks [PDF]

open access: green, 2020
Lianli Gao   +3 more
openalex   +1 more source

Adversarial Attacks on Hyperbolic Networks

open access: yes
As hyperbolic deep learning grows in popularity, so does the need for adversarial robustness in the context of such a non-Euclidean geometry. To this end, this paper proposes hyperbolic alternatives to the commonly used FGM and PGD adversarial attacks.
Max van Spengler   +2 more
openaire   +2 more sources

A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley   +1 more source

Certified Accuracy and Robustness: How different architectures stand up to adversarial attacks

open access: yesIntelligent Systems with Applications
Adversarial attacks are a concern for image classification using neural networks. Numerous methods have been created to minimize the effects of attacks, where the best defense against such attacks is through adversarial training, which has proven to be ...
Azryl Elmy Sarih   +2 more
doaj   +1 more source

Towards Interpretable Adversarial Examples via Sparse Adversarial Attack

open access: yes
Sparse attacks are to optimize the magnitude of adversarial perturbations for fooling deep neural networks (DNNs) involving only a few perturbed pixels (i.e., under the l0 constraint), suitable for interpreting the vulnerability of DNNs. However, existing solutions fail to yield interpretable adversarial examples due to their poor sparsity. Worse still,
Lin, Fudong   +4 more
openaire   +2 more sources

AT‐AER: Adversarial Training With Adaptive Example Reuse

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu   +5 more
wiley   +1 more source

Robustness Against Adversarial Attacks Via Learning Confined Adversarial Polytopes

open access: yesICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Comment: The paper has been accepted in ICASSP ...
Hamidi, Shayan Mohajer, Ye, Linfeng
openaire   +2 more sources

Autopsy, deathways, and intercultural healthcare in the southern Peruvian Andes Autopsie, pratiques mortuaires et soins de santé interculturels dans le sud des Andes péruviennes

open access: yesJournal of the Royal Anthropological Institute, EarlyView.
While death remains a popular topic for anthropology, relatively few ethnographic accounts consider the modern bureaucratic processes accompanying it. One such process is public health autopsy, which scholars have largely taken for granted. Existing analysis has regarded it as a form of ‘cultural brokering’ and autopsy reluctance in communities is seen,
David M.R. Orr
wiley   +1 more source

Home - About - Disclaimer - Privacy