Results 251 to 260 of about 24,885,017 (322)
Some of the next articles are maybe not open access.
Computer Communications, 2023
Network Intrusion Detection System (NIDS) is a key component in securing the computer network from various cyber security threats and network attacks.
Khushnaseeb Roshan +2 more
semanticscholar +1 more source
Network Intrusion Detection System (NIDS) is a key component in securing the computer network from various cyber security threats and network attacks.
Khushnaseeb Roshan +2 more
semanticscholar +1 more source
IEEE Transactions on Control of Network Systems, 2022
Based on machine learning (ML) technique, the data-driven power system dynamic security assessment (DSA) has received significant research interest. Yet, the well-trained ML-based models with high training and testing accuracy may be vulnerable to the ...
Chao Ren, Yan Xu
semanticscholar +1 more source
Based on machine learning (ML) technique, the data-driven power system dynamic security assessment (DSA) has received significant research interest. Yet, the well-trained ML-based models with high training and testing accuracy may be vulnerable to the ...
Chao Ren, Yan Xu
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2022
There has been an increasing interest in the use of data-driven techniques for classifying cyber-attacks and physical faults in cyber-physical systems.
Maryam Farajzadeh-Zanjani +3 more
semanticscholar +1 more source
There has been an increasing interest in the use of data-driven techniques for classifying cyber-attacks and physical faults in cyber-physical systems.
Maryam Farajzadeh-Zanjani +3 more
semanticscholar +1 more source
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
IEEE Conference on Computer Communications, 2021With the rapid advancement in machine learning (ML), ML-based Intrusion Detection Systems (IDSs) are widely deployed to protect networks from various attacks.
Ning Wang +4 more
semanticscholar +1 more source
IEEE Transactions on Smart Grid, 2022
Based on machine learning (ML) technique, the data-driven power system stability assessment has received significant research interests in recent years.
Chao Ren +5 more
semanticscholar +1 more source
Based on machine learning (ML) technique, the data-driven power system stability assessment has received significant research interests in recent years.
Chao Ren +5 more
semanticscholar +1 more source
AdvDoor: adversarial backdoor attack of deep learning system
International Symposium on Software Testing and Analysis, 2021Deep Learning (DL) system has been widely used in many critical applications, such as autonomous vehicles and unmanned aerial vehicles. However, their security is threatened by backdoor attack, which is achieved by adding artificial patterns on specific ...
Quan Zhang +5 more
semanticscholar +1 more source
Defending Against Adversarial Attacks via Neural Dynamic System
Neural Information Processing Systems, 2022Although deep neural networks (DNN) have achieved great success, their applications in safety-critical areas are hindered due to their vulnerability to adversarial attacks. Some recent works have accordingly proposed to enhance the robustness of DNN from
Xiyuan Li, Xin Zou, Weiwei Liu
semanticscholar +1 more source
The Adversary System: Cui Bono?
Annals of Internal Medicine, 1982Excerpt The article by Richman in this issue(1) provides a dispassionate and objective review of compensation for industrial disease.
W. KEITH, C. MORGAN
openaire +2 more sources
Adversarial-Example Attacks Toward Android Malware Detection System
IEEE Systems Journal, 2020Recently, it was shown that the generative adversarial network (GAN) based adversarial-example attacks could thoroughly defeat the existing Android malware detection systems.
Heng Li +4 more
semanticscholar +1 more source
Robust Android Malware Detection System Against Adversarial Attacks Using Q-Learning
Information Systems Frontiers, 2020Since the inception of Andoroid OS, smartphones sales have been growing exponentially, and today it enjoys the monopoly in the smartphone marketplace.
Hemant Rathore +3 more
semanticscholar +1 more source

