Results 71 to 80 of about 85,609 (269)
Link Prediction Adversarial Attack
Deep neural network has shown remarkable performance in solving computer vision and some graph evolved tasks, such as node classification and link prediction. However, the vulnerability of deep model has also been revealed by carefully designed adversarial examples generated by various adversarial attack methods.
Jinyin Chen +4 more
openaire +2 more sources
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Care and COVID 19: Lessons for liberals and neoliberals
Abstract Within the liberal political traditions, care is regarded as a private matter, a problem of ethics rather than justice. Social justice is framed as an issue of economics (re/distribution), culture (recognition) and/or politics (representation).
Kathleen Lynch
wiley +1 more source
Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors
Adaptive adversarial attacks, where adversaries tailor their strategies with full knowledge of defense mechanisms, pose significant challenges to the robustness of adversarial detectors. In this paper, we introduce RADAR (Robust Adversarial Detection via
Raz Lapid, Almog Dubin, Moshe Sipper
doaj +1 more source
Study on Adversarial Sample Attacks on Deep Learning Based Fingerprinting Indoor Localization [PDF]
This study investigated adversarial attacks on Deep Learning(DL) based Wi-Fi fingerprint indoor positioning systems, which have significantly improved indoor localization performance by effectively extracting deep features from Received Signal Strength ...
ZHANG Xuejun, XI Ayou, JIA Xiaohong, ZHANG Bin, LI Mei, DU Xiaogang, HUANG Haiyan
doaj +1 more source
Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack
In recent times, the swift evolution of adversarial attacks has captured widespread attention, particularly concerning their transferability and other performance attributes. These techniques are primarily executed at the sample level, frequently overlooking the intrinsic parameters of models.
Zhibo Jin +6 more
openaire +2 more sources
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem.
Hassan Khazane +3 more
doaj +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source

