过去一年中添加的文章,按日期排序

Leveraging Parallel Technique in Anomaly Detection Using Autoencoder Neural Network

VB Reddy - 2024 - scholarworks.calstate.edu
2 天前 - … background of deep learning model, such as autoencoders, adversarial autoencoders,
… have discussed evaluation for adversarial autoencoders for intrusion detection, using …

A Novel Bifurcation Method for Observation Perturbation Attacks on Reinforcement Learning Agents: Load Altering Attacks on a Cyber Physical Power System

K Broda-Milian, R Al-Mallah, H Dagdougui - arXiv preprint arXiv …, 2024 - arxiv.org
5 天前 - … Based on this analysis of adversarial observations, the attack’s adversarial budget
will be reduced until the observations it produces appear plausible. Attacks in this work use …

Adversarial Machine Learning in IoT: Vulnerability Analysis and Roboustness

A Namvar - 2024 - unsworks.unsw.edu.au
7 天前 - … Our investigation extends to deep learning models tailored for intrusion detection, …
intricate Resnet50 deep model. We systematically generate imperceptible adversarial inputs …

Reducing Overfitting in Deep Learning Intrusion Detection for Power Systems with Ctgan

L AGARWAL, B Jaint, A Mandpura - Available at SSRN 4881947 - papers.ssrn.com
10 天前 - … power systems leading to overfitting and reduced detection accuracy… learning
based IDS for power systems by leveraging Conditional Tabular Generative Adversarial Networks

A REVIEW OF GENERATIVE ADVERSARIAL NETWORKS FOR SECURITY APPLICATIONS

SM Rayavarapu, SP Tammineni, SR Gottapu… - … Automatyka, Pomiary w …, 2024 - ph.pollub.pl
10 天前 - … and cyber attack detection have grown in significance. Machine learning techniques
offer a … been bringing the capabilities of machine learning (ML) to use to make their security

Adversarial Attacks, Defences and Visualisation for AI-based NIDS

K He - 2024 - researchspace.auckland.ac.nz
11 天前 - intrusion detection systems (NIDS). By developing novel … been published as “Adversarial
machine learning for network intrusion detection systems: a comprehensive survey” in …

[引用][C] Special Issue on “Ensuring security for artificial intelligence applications in mobile edge computing software systems

L Qi, VS Sheng, X Xu, J Chen - Software: Practice and Experience - Wiley Online Library
13 天前 - … the edge of the network. Many artificial intelligence (AI) applications such as smart
assistant, driverless cars, and smart city powered by machine learning demand low latency …

Diffusion-based Adversarial Purification for Intrusion Detection

M Amine Merzouk, E Beurier, R Yaich… - arXiv e …, 2024 - ui.adsabs.harvard.edu
14 天前 - … of machine learning techniques in intrusion detection … purifying adversarial
examples in network intrusion detection… configurations maximizing adversarial robustness with …

Investigating the effectiveness of models in detecting deepfake videos: A systematic review

S Mall, J Singh, R Golash - Artificial Intelligence and Information …, 2024 - taylorfrancis.com
14 天前 - … -art deep learning-based systems to identifying deepfake videos by developing a
model for deepfake detection… , referred to as deep adversarial models (for instance, generative …

Person of interest rapid identification and tracking (POIRIT) assistance system

D Arif - 2024 - open.uct.ac.za
14 天前 - … prepares datasets for training deep learning models, … than the facial hair detection
systems available. These results … It incorporates the use of Generative Adversarial Networks (…