|
|
|
William Villegas-Ch, Angel Jaramillo-Alcázar and Sergio Luján-Mora
This study evaluated the generation of adversarial examples and the subsequent robustness of an image classification model. The attacks were performed using the Fast Gradient Sign method, the Projected Gradient Descent method, and the Carlini and Wagner ...
ver más
|
|
|
|
|
|
|
Vasily Kostyumov
Pág. 11 - 20
Deep learning has received a lot of attention from the scientific community in recent years due to excellent results in various areas of tasks, including computer vision. For example, in the problem of image classification, some authors even announced th...
ver más
|
|
|
|
|
|
|
Haizhao Liang, Zhi Li, Jinze Wu, Yu Zheng, Hongyu Chu and Jianying Wang
The guidance problem of a confrontation between an interceptor, a hypersonic vehicle, and an active defender is investigated in this paper. As a hypersonic multiplayer pursuit-evasion game, the optimal guidance scheme for each adversary in the engagement...
ver más
|
|
|
|
|
|
|
Mashail Shaeel Althabiti,Manal Abdullah
Pág. pp. 90 - 106
Data stream is the huge amount of data generated in various fields, including financial processes, social media activities, Internet of Things applications, and many others. Such data cannot be processed through traditional data mining algorithms due to ...
ver más
|
|
|
|
|
|
|
V. Belsky,I. Gerasimov,K. Tsaregorodtsev,I. Chizhov
Pág. 1 - 23
?Personal data exchange and disclosure prevention are widespread problems in our digital world. There are a couple of information technologies embedded in the commercial and government processes. People need to exchange their personal information while u...
ver más
|
|
|
|
|
|
|
Francesco Bergadano, Fabio Carretto, Fabio Cogno and Dario Ragno
A novel approach to defacement detection is proposed in this paper, addressing explicitly the possible presence of a passive adversary. Defacement detection is an important security measure for Web Sites and Applications, aimed at avoiding unwanted modif...
ver más
|
|
|
|