Defense strategies for adversarial machine learning: A survey

P Bountakas, A Zarras, A Lekidis, C Xenakis - Computer Science Review, 2023 - Elsevier
Abstract Adversarial Machine Learning (AML) is a recently introduced technique, aiming to
deceive Machine Learning (ML) models by providing falsified inputs to render those models …

Identification of plant-leaf diseases using CNN and transfer-learning approach

SM Hassan, AK Maji, M Jasiński, Z Leonowicz… - Electronics, 2021 - mdpi.com
The timely identification and early prevention of crop diseases are essential for improving
production. In this paper, deep convolutional-neural-network (CNN) models are …

High-tech defense industries: developing autonomous intelligent systems

J Reis, Y Cohen, N Melão, J Costa, D Jorge - Applied Sciences, 2021 - mdpi.com
After the Cold War, the defense industries found themselves at a crossroads. However, it
seems that they are gaining new momentum, as new technologies such as robotics and …

An efficient adversarial example generation algorithm based on an accelerated gradient iterative fast gradient

J Liu, Q Zhang, K Mo, X Xiang, J Li, D Cheng… - Computer Standards & …, 2022 - Elsevier
Most existing deep neural networks are susceptible to the influence of adversarial examples,
which may cause them to output incorrect prediction results. An adversarial example is the …

[HTML][HTML] Fusion of sequential visits and medical ontology for mortality prediction

K Niu, Y Lu, X Peng, J Zeng - Journal of Biomedical Informatics, 2022 - Elsevier
The goal of mortality prediction task is to predict the future death risk of patients according to
their previous Electronic Healthcare Records (EHR). The main challenge of mortality …

Privacy and security in cognitive cities: A systematic review

J Machin, E Batista, A Martínez-Ballesté, A Solanas - Applied Sciences, 2021 - mdpi.com
Featured Application This article recalls the concept of cognitive city and provides a timely
review of the state of the art in the field of information security and privacy for cognitive cities …

Simulation of authentication in information-processing electronic devices based on poisson pulse sequence generators

V Maksymovych, E Nyemkova, C Justice, M Shabatura… - Electronics, 2022 - mdpi.com
Poisson pulse sequence generators are quite well studied, have good statistical properties,
are implemented both in software and hardware, but have not yet been used for the purpose …

Segmentation of liver anatomy by combining 3D U-net approaches

A Affane, A Kucharski, P Chapuis, S Freydier… - Applied Sciences, 2021 - mdpi.com
Accurate liver vessel segmentation is of crucial importance for the clinical diagnosis and
treatment of many hepatic diseases. Recent state-of-the-art methods for liver vessel …

Fuzzy and neural network approaches to wind turbine fault diagnosis

S Farsoni, S Simani, P Castaldi - Applied Sciences, 2021 - mdpi.com
The fault diagnosis of safety critical systems such as wind turbine installations includes
extremely challenging aspects that motivate the research issues considered in this paper …

A self-attentional ResNet-LightGBM model for IoT-enabled voice liveness detection

X Sun, J Fu, B Wei, Z Li, Y Li… - IEEE Internet of Things …, 2022 - ieeexplore.ieee.org
Voice user interface (VUI) brings high efficiency and convenience for the applications of
Internet of Things (IoT), meanwhile, it can also cause increasingly serious security issues …