Results 41 to 50 of about 160,235 (299)

Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics

open access: yes, 2019
Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for this purpose.
Binder, Alexander   +4 more
core   +1 more source

Self‐Assembled Monolayers in p–i–n Perovskite Solar Cells: Molecular Design, Interfacial Engineering, and Machine Learning–Accelerated Material Discovery

open access: yesAdvanced Materials, EarlyView.
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley   +1 more source

Breaking Machine Learning Models with Adversarial Attacks and its Variants

open access: yesProceedings of the International Florida Artificial Intelligence Research Society Conference
Machine learning models can be by adversarial attacks, subtle, imperceptible perturbations to inputs that cause the model to produce erroneous outputs.
Pavan Reddy
doaj   +1 more source

Investigation of the impact effectiveness of adversarial data leakage attacks on the machine learning models [PDF]

open access: yesITM Web of Conferences
Machine learning solutions have been successfully applied in many aspects, so it is now important to ensure the security of the machine learning models themselves and develop appropriate solutions and approaches.
Parfenov Denis   +3 more
doaj   +1 more source

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection

open access: yesFuture Internet
During the last decade, the cybersecurity literature has conferred a high-level role to machine learning as a powerful security paradigm to recognise malicious software in modern anti-malware systems.
Muhammad Imran   +2 more
doaj   +1 more source

From the Discovery of the Giant Magnetocaloric Effect to the Development of High‐Power‐Density Systems

open access: yesAdvanced Materials Technologies, EarlyView.
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz   +5 more
wiley   +1 more source

A Systematic Review of Adversarial Machine Learning and Deep Learning Applications

open access: yesAl-Iraqia Journal for Scientific Engineering Research
The review delves into creating an understandable framework for machine learning in robotics. It stresses the significance of machine learning in materials science and robotics highlighting how it can transform industries by boosting efficiency and ...
Tabarak Ali Abdalkareem   +2 more
doaj   +1 more source

Adversarial Machine Learning Applied to Intrusion and Malware Scenarios: A Systematic Review

open access: yesIEEE Access, 2020
Cyber-security is the practice of protecting computing systems and networks from digital attacks, which are a rising concern in the Information Age. With the growing pace at which new attacks are developed, conventional signature based attack detection ...
Nuno Martins   +3 more
doaj   +1 more source

Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

open access: yesJournal of Cybersecurity and Privacy, 2021
As the internet continues to be populated with new devices and emerging technologies, the attack surface grows exponentially. Technology is shifting towards a profit-driven Internet of Things market where security is an afterthought.
Pavlos Papadopoulos   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy