Results 41 to 50 of about 160,235 (299)
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for this purpose.
Binder, Alexander +4 more
core +1 more source
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley +1 more source
Breaking Machine Learning Models with Adversarial Attacks and its Variants
Machine learning models can be by adversarial attacks, subtle, imperceptible perturbations to inputs that cause the model to produce erroneous outputs.
Pavan Reddy
doaj +1 more source
Investigation of the impact effectiveness of adversarial data leakage attacks on the machine learning models [PDF]
Machine learning solutions have been successfully applied in many aspects, so it is now important to ensure the security of the machine learning models themselves and develop appropriate solutions and approaches.
Parfenov Denis +3 more
doaj +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source
During the last decade, the cybersecurity literature has conferred a high-level role to machine learning as a powerful security paradigm to recognise malicious software in modern anti-malware systems.
Muhammad Imran +2 more
doaj +1 more source
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz +5 more
wiley +1 more source
A Systematic Review of Adversarial Machine Learning and Deep Learning Applications
The review delves into creating an understandable framework for machine learning in robotics. It stresses the significance of machine learning in materials science and robotics highlighting how it can transform industries by boosting efficiency and ...
Tabarak Ali Abdalkareem +2 more
doaj +1 more source
Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review
Cyber-security is the practice of protecting computing systems and networks from digital attacks, which are a rising concern in the Information Age. With the growing pace at which new attacks are developed, conventional signature based attack detection ...
Nuno Martins +3 more
doaj +1 more source
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought.
Pavlos Papadopoulos +5 more
doaj +1 more source

