[PDF][PDF] Diversity's impact on defining the family

KM Galvin - The family communication sourcebook, 2006 - natcom.org
Contemporary families represent a world of “normative instability and definitional crisis”(Stacey,
1999a, p. 489), making it more difficult for members to keep order in their personal lives …

[PDF][PDF] Survey on IoT security: Challenges and solution using《 真) machine learning, artificial intelligence and blockchain tyS technology

BK Mohanta, D Jena, U Satapathy - researchgate.net
… paper has done a survey on security and privacy issue on IoT applications and systems. The
… Shen, Sybil attacks and their defenses in the internet of things, IEEE Internet Things J. 1 (5) (…

[PDF][PDF] 阁EasyChair Preprint

NEMM Threats - 2024 - easychair.org
… real-world mobile malware attacks and defense strategies, this … and the defense mechanisms
employed to mitigate the attacks. … and the effectiveness of different defense approaches [5]. …

面向网络空间防御的对抗机器学习研究综述

余正飞, 闫巧, 周鋆 - 自动化学报, 2022 - aas.net.cn
… of attack against machine learning in cyberspace defense systems, and thoroughly assess
its security … of launching evasion attacks in the test phase, launching poisoning attacks in the …

联邦学习安全与隐私保护研究综述

周俊, 方国英, 吴楠 - 西华大学学报(自然科学版), 2020 - xhuqk.com
… latest defense measures. Finally, this paper discusses the security issues still existing in the
current … Keywords: federated learning;poisoning attack;adversarial attack;privacy leakage …

[PDF][PDF] 机器学习安全性问题及其防御技术研究综述

李盼, 赵文涛, 刘强, 崔建京, 殷建平 - 计算机科学与探索, 2018 - researchgate.net
… Systematic poisoning attacks on and defenses for machine learning in healthcare[J]. IEEE
Journal of Biomedical and Health Informatics, 2015, 19(6): 1893-1905. [39] Hu Weiwei, Tan …

Data Mining for Cyber 𠄁Physical Systems

MV Rao, DA Reddy, A Ampavathi… - Data Mining and …, 2022 - Wiley Online Library
The Cyber‐Physical System (CPS) combines corporeal gadgets (ie sensors) through digital
(ie, illuminating) apparatuses to create an elusive structure that returns wisely towards …

基于信息-物理-社会-思维融合空间的物联网科学技术体系研究

HS Ning, H Liu - Science China Information Sciences, 2015 - Springer
… Military science serves the national defense and evaluates military strategy, tactics, commands,
operations, and logistics, to explore war’s essential attributes through extremely complex …

[PDF][PDF] Security Trade 丁off Ontological Approach

B Andrzej - academia.edu
… ), expressing generally specific issues or the differences of the considered security investments
from other kinds of investments eg safety , defense , and business related investments, x …

脑机接口临床研究伦理审查的挑战与建议

王雪芹, 孙洪强, 司佳玥, 林子琰, 翟晓梅… - Chinese Medical Sciences … - cmsj.cams.cn
defense system against "hacker" and malicious software attacks and devise effective security
… mitigate potential biases, discrimination, and privacy issues. Crucially, it must address the …