Results 11 to 20 of about 1,102 (116)
Cloud Storage File Recoverability [PDF]
Data loss is perceived as one of the major threats for cloud storage. Consequently, the security community developed several challenge-response protocols that allow a user to remotely verify whether an outsourced file is still intact.
Armknecht, Frederik +3 more
core +2 more sources
Differentiable sampling of molecular geometries with uncertainty-based adversarial attacks
Neural network (NN) interatomic potentials provide fast prediction of potential energy surfaces, closely matching the accuracy of the electronic structure methods used to produce the training data.
Gómez-Bombarelli, Rafael +2 more
core +1 more source
Recognition model of IIoT equipment in coal mine
The computing and storage resources of the industrial Internet of things (IIoT) equipment in the coal mine are limited, making it vulnerable to illegal network intrusion, causing sensitive data leakage or malicious tampering, and threatening the safety ...
HAO Qinxia, LI Huimin
doaj +1 more source
A secure privacy preserving deduplication scheme for cloud computing [PDF]
© 2019 Elsevier B.V. Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs.
Fan, Y +4 more
core +1 more source
A software approach to defeating side channels in last-level caches
We present a software approach to mitigate access-driven side-channel attacks that leverage last-level caches (LLCs) shared across cores to leak information between security domains (e.g., tenants in a cloud).
Arcangeli A. +6 more
core +1 more source
This study aims to perform a thorough systematic review investigating and synthesizing existing research on defense strategies and methodologies in adversarial attacks using machine learning (ML) and deep learning methods.
Khaleel Yahya Layth +5 more
doaj +1 more source
MojiTalk: Generating Emotional Responses at Scale
Generating emotional language is a key step towards building empathetic natural language processing agents. However, a major challenge for this line of research is the lack of large-scale labeled training data, and previous studies are limited to only ...
Wang, William Yang, Zhou, Xianda
core +1 more source
Context-Aware Generative Adversarial Privacy
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often
Chen, Xiao +4 more
core +2 more sources
CoNLL 2017 Shared Task : Multilingual Parsing from Raw Text to Universal Dependencies [PDF]
The Conference on Computational Natural Language Learning (CoNLL) features a shared task, in which participants train and test their learning systems on the same data sets.
Attia, Mohammed +61 more
core +3 more sources
Six artificial intelligence strategies advance autism research from tool optimization to paradigm shift: causal modeling, spatiotemporal networks, multimodal integration, digital twins, social cognition mapping, collaborative learning, and context‐aware interventions for precision care.
Ting Zhang +3 more
wiley +1 more source

