Artificial intelligence systems are increasingly being used in industrial applications, security and military contexts, disaster response complexes, policing and justice practices, finance …
Q Liu, J Cao, J Zhang, Y Zhong, T Ba, Y Zhang - IEEE Access, 2023 - ieeexplore.ieee.org
In this paper, a prediction model based on Empirical Wavelet Transform (EWT) for FGSM-Bi- LSTM network is proposed to address the short-term power load forecasting problem. The …
AI systems are notorious for their fragility; minor input changes can potentially cause major output swings. When such systems are deployed in critical areas like finance, the …
RS Dhanaraj, M Sridevi - IEEE Transactions on Artificial …, 2024 - ieeexplore.ieee.org
Adversarial attack is a method used to deceive Machine Learning (ML) models, that offers a technique to test the robustness of the given model and it is vital to balance robustness with …
Vehicle automation has been in the works for a long time now. Automatic brakes, cruise control, GPS satellite navigation, etc. are all common features seen in today's automobiles …
An amplified reflection and exploitation-based distributed denial of service (DDoS) attack allows an attacker to launch a volumetric attack on the target server or network. These …
T Islam, MA Sheakh, AN Jui, O Sharif, MZ Hasan - researchgate.net
Vehicle automation has been in the works for a long time now. Automatic brakes, cruise control, GPS satellite navigation, etc. are all common features seen in today's automobiles …
El objetivo⠀ principal fue determinar la diferencia de medias de dos tratamientos del modelo predictivo machine learning entrenado entre la calidad de aplicaciones y seguridad …