Adversarial Attack Detection in Industrial Control Systems Using LSTM-Based Intrusion Detection and Black-Box Defense Strategies [PDF]
Motaz Abdulaziz Almedires +2 more
openalex +1 more source
“I Wish I Had Better Answers”: Organizational Ignorance in US Criminal Courts
ABSTRACT Systems of monetary sanctions in US criminal courts present an opportunity for furthering the sociological understanding of complex and consequential organizations. We examine whether and how court actors across eight states understand the organizational processes supporting the fiscal logic of legal financial obligations (LFOs).
Sarah K. S. Shannon +3 more
wiley +1 more source
Visual security defense for industrial inspection based on computer vision. [PDF]
Jiang Z, Yuan H, Zeng C, Fu L.
europepmc +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source
A Spatially Distributed Perturbation Strategy with Smoothed Gradient Sign Method for Adversarial Analysis of Image Classification Systems. [PDF]
Xu Y, Li J, Chang D, Dong Y.
europepmc +1 more source
A No-Defense Defense Against Gradient-Based Adversarial Attacks on ML-NIDS: Is Less More? [PDF]
Mohamed elShehaby, Ashraf Matrawy
openalex
Abstract AI systems are rapidly transitioning from laboratory demonstrations to decision‐making technologies deployed in high‐stakes domains. Yet reliability remains a primary obstacle to responsible adoption: discriminative models can be confidently wrong under out‐of‐distribution (OOD) inputs, and foundation models (FMs) such as large language models
Sean Du
wiley +1 more source
SecMLOps: A comprehensive framework for integrating security throughout the machine learning operations lifecycle. [PDF]
Zhang X, Zhao P, Jaskolka J, Li H, Lu R.
europepmc +1 more source
Improving Cyber Defense Against Ransomware: A Generative Adversarial Networks-Based Adversarial Training Approach for Long Short-Term Memory Network Classifier [PDF]
Ping Wang +4 more
openalex +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source

