Results 31 to 40 of about 1,118 (118)

Privacy Side Channels in Machine Learning Systems

open access: yes, 2023
Most current approaches for protecting privacy in machine learning (ML) assume that models exist in a vacuum, when in reality, ML models are part of larger systems that include components for training data filtering, output monitoring, and more.
Carlini, Nicholas   +7 more
core  

Generative AI for Requirements Engineering: A Systematic Literature Review

open access: yesSoftware: Practice and Experience, Volume 56, Issue 2, Page 141-170, February 2026.
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng   +6 more
wiley   +1 more source

BayesImposter: Bayesian Estimation Based .bss Imposter Attack on Industrial Control Systems

open access: yes, 2022
Over the last six years, several papers used memory deduplication to trigger various security issues, such as leaking heap-address and causing bit-flip in the physical memory.
Barua, Anomadarshi   +2 more
core  

TargetGen‐RNN model discovers novel antibiotic compound targeting drug‐resistant Staphylococcus aureus

open access: yesInterdisciplinary Medicine, Volume 4, Issue 1, January 2026.
TargetGen‐recurrent neural network (RNN), an advanced generative model, generated 28,708 unique and novel compounds, identifying SAK‐2970 as a potent antibiotic against drug‐resistant Staphylococcus aureus. Exhibiting strong biofilm inhibition, high therapeutic efficacy, and minimal systemic toxicity in vivo, SAK‐2970 highlights its safety and clinical
Shakeel Ahmad Khan   +2 more
wiley   +1 more source

Event Log Correlation for Multi‐Step Attack Detection

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 1, January/February 2026.
ABSTRACT Event log correlation (ELC) is central to detecting multi‐step attacks (MSAD) that unfold across heterogeneous systems and long time horizons. This review synthesises ELC families—mining/sequence, graph learning, provenance/causal correlation, and hybrid LLM‐assisted approaches—through an MSAD‐first lens that ties methods to attack stages and ...
Syed Usman Shaukat   +2 more
wiley   +1 more source

Blockchain‐Enabled Privacy‐Preserving Access Control for EHRs Sharing With Optimized User and Attribute Revocation

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Electronic health records (EHRs) have become a crucial application in cloud computing environments, necessitating advanced privacy‐preserving access control mechanisms. Ciphertext policy attribute‐based encryption (CP‐ABE) is a widely recognized solution for secure access control in outsourced data environments.
Khanadech Worapaluk   +2 more
wiley   +1 more source

Finish Them!: Pricing Algorithms for Human Computation [PDF]

open access: yes, 2014
Given a batch of human computation tasks, a commonly ignored aspect is how the price (i.e., the reward paid to human workers) of these tasks must be set or varied in order to meet latency or cost constraints.
Gao, Yihan, Parameswaran, Aditya
core  

MACD: Online Video Anomaly Detection via Multi‐Agent Counterfactual Dialectics

open access: yesIET Software, Volume 2026, Issue 1, 2026.
Online video anomaly detection (VAD) necessitates real‐time inference without access to future temporal context. Existing training‐free methods, while promising, often suffer from correlation bias, misclassifying infrequent but benign actions (e.g., running for exercise) as anomalies due to a lack of causal reasoning.
Xiaoye Ouyang   +6 more
wiley   +1 more source

School partnered approaches to emotionally based school avoidance in UK primary and secondary school‐age learners: A systematic review

open access: yesBritish Educational Research Journal, Volume 51, Issue 6, Page 2871-2892, December 2025.
Abstract The Covid‐19 pandemic and its sequalae mark the genesis of persistently high absenteeism in primary and secondary schools across the UK. Emotionally based school avoidance (EBSA) is documented as contributing to increased absenteeism. Early intervention is required to prevent this pattern of activity from becoming entrenched.
Caitlin McDonald, Aneeza Pervez
wiley   +1 more source

Home - About - Disclaimer - Privacy