Memristor-based neural network circuit of emotional habituation with contextual dependency

J Sun, L Zhao, S Wen, Y Wang - IEEE Internet of Things Journal, 2023 - ieeexplore.ieee.org
Most memristor-based neural networks only consider habituation under repeated stimuli, but
the emotional habituation under repeated emotional stimuli is ignored. In this article, a …

A hybrid artificial intelligence algorithm for fault diagnosis of hot rolled strip crown imbalance

R Zhang, Y Qi, S Kong, X Wang, M Li - Engineering Applications of Artificial …, 2024 - Elsevier
In the production process of hot continuous rolling, due to the imbalance between the
number of normal cases and fault cases, the traditional supervised learning methods are …

A Deep Reinforcement Learning Framework to Evade Black-Box Machine Learning Based IoT Malware Detectors Using GAN-Generated Influential Features

RM Arif, M Aslam, S Al-Otaibi… - IEEE …, 2023 - ieeexplore.ieee.org
In the internet of things (IoT) networks, machine learning (ML) is significantly used for
malware and adversary detection. Recently, research has shown that adversarial attacks …

Evaluation of deep learning model in the field of electromagnetic signal recognition

J Wang, H Zha, J Fu - IEEE INFOCOM 2022-IEEE Conference …, 2022 - ieeexplore.ieee.org
With the rapid growth of spatial electromagnetic devices, electromagnetic signals are
becoming more and more dense and complex, traditional methods are increasingly difficult …

Towards a model for zero trust data

JM Pittman, S Alaee, C Crosby, T Honey… - American Journal of …, 2022 - ingentaconnect.com
The world has realized traditional cybersecurity models are flawed because users and
systems behind the perimeter are implicitly trusted. The response has been to treat access …

Research on Network Intrusion Simulation and Adversarial Strategies Based on Generate Adversarial Networks

X Zhao, J Heng, Q Sun - Proceedings of the 8th International Conference …, 2023 - dl.acm.org
The problem of information security follows, and a lot of information data are generated on
the network, so it is very easy for information to be illegally invaded, which affects the …

A GAN-Based Real-Time Covert Energy Theft Attack Against Data-Driven Detectors

Z Ding, F Wu, L Cui, X Hu, G Xie - International Conference on Testbeds …, 2022 - Springer
The advanced metering infrastructure (AMI) system has been rapidly established around the
world, effectively improving the communication capability of the power system …