Results 71 to 80 of about 85,609 (269)

Link Prediction Adversarial Attack

open access: yesCoRR, 2018
Deep neural network has shown remarkable performance in solving computer vision and some graph evolved tasks, such as node classification and link prediction. However, the vulnerability of deep model has also been revealed by carefully designed adversarial examples generated by various adversarial attack methods.
Jinyin Chen   +4 more
openaire   +2 more sources

OntoLogX: Ontology‐Guided Knowledge Graph Extraction From Cybersecurity Logs With Large Language Models

open access: yesAdvanced Intelligent Systems, EarlyView.
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti   +4 more
wiley   +1 more source

Care and COVID 19: Lessons for liberals and neoliberals

open access: yesChild &Family Social Work, EarlyView., 2023
Abstract Within the liberal political traditions, care is regarded as a private matter, a problem of ethics rather than justice. Social justice is framed as an issue of economics (re/distribution), culture (recognition) and/or politics (representation).
Kathleen Lynch
wiley   +1 more source

Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors

open access: yesMathematics
Adaptive adversarial attacks, where adversaries tailor their strategies with full knowledge of defense mechanisms, pose significant challenges to the robustness of adversarial detectors. In this paper, we introduce RADAR (Robust Adversarial Detection via
Raz Lapid, Almog Dubin, Moshe Sipper
doaj   +1 more source

Study on Adversarial Sample Attacks on Deep Learning Based Fingerprinting Indoor Localization [PDF]

open access: yesJisuanji gongcheng
This study investigated adversarial attacks on Deep Learning(DL) based Wi-Fi fingerprint indoor positioning systems, which have significantly improved indoor localization performance by effectively extracting deep features from Received Signal Strength ...
ZHANG Xuejun, XI Ayou, JIA Xiaohong, ZHANG Bin, LI Mei, DU Xiaogang, HUANG Haiyan
doaj   +1 more source

Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack

open access: yesCoRR
In recent times, the swift evolution of adversarial attacks has captured widespread attention, particularly concerning their transferability and other performance attributes. These techniques are primarily executed at the sample level, frequently overlooking the intrinsic parameters of models.
Zhibo Jin   +6 more
openaire   +2 more sources

AI‐Assisted IoT‐Enabled ECG Monitoring: Integrating Foundational and Generative AI Tools for Sustainable Smart Healthcare—Recent Trends

open access: yesAI &Innovation, EarlyView.
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury   +2 more
wiley   +1 more source

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

open access: yesFuture Internet
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem.
Hassan Khazane   +3 more
doaj   +1 more source

“Will you be there for me?” Social support from family and friends during cold case sexual assault prosecutions

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell   +4 more
wiley   +1 more source

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy