Adversarial attacks are implemented when an attacker introduces maliciously designed inputs to deceive or corrupt machinelearning (ML) models. In this study, the researcher …
P Vähäkainu, M Lehto, A Kariluoto - … International Conference on …, 2020 - books.google.com
IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly …
B Gomathi, J Uma - Society 5.0 and the Future of Emerging …, 2022 - api.taylorfrancis.com
Adversarial attacks and defenses on cyber-physical systems is basically an AI (artifi cial intelligence) technique that mimics the human mind, ie, the process of human thinking …
C Mehta, P Harniya, S Kamat - 2022 2nd International …, 2022 - ieeexplore.ieee.org
In today's world, machine learning is an emerging technology which is being used extensively in different domains. In order to offer effective solutions in the broad area of …
T Hossain - Applied Research in Artificial Intelligence and Cloud …, 2022 - researchberg.com
The increasing adoption of machine learning models across various domains has brought to light the critical issue of their vulnerability to adversarial attacks, raising concerns about their …
Aim and Scope The Covid-19 pandemic have accelerated a transition towards an era of relying on cyberspace to intimately connect to the modern world with applications including …
Abstract Machine learning based system are increasingly being used for sensitive tasks such as security surveillance, guiding autonomous vehicle, taking investment decisions …
Y Zheng-Fei, Y Qiao, Z Yun - Journal of Automation, 2022 - aas.net.cn
Abstract Machine learning has the ability to learn in various conditions, and becomes a research hotspot and an important direction for cyberspace defense. Unfortunately, machine …
J Harshith, MS Gill, M Jothimani - arXiv preprint arXiv:2308.12918, 2023 - arxiv.org
There have been recent adversarial attacks that are difficult to find. These new adversarial attacks methods may pose challenges to current deep learning cyber defense systems and …