112   Artículos

 
en línea
Junlin Lou, Burak Yuksek, Gokhan Inalhan and Antonios Tsourdos    
In this study, we consider the problem of motion planning for urban air mobility applications to generate a minimal snap trajectory and trajectory that cost minimal time to reach a goal location in the presence of dynamic geo-fences and uncertainties in ... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Hassan Khazane, Mohammed Ridouani, Fatima Salahdine and Naima Kaabouch    
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem. Among these use cases is IoT security, where numerous systems are dep... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
William Villegas-Ch, Angel Jaramillo-Alcázar and Sergio Luján-Mora    
This study evaluated the generation of adversarial examples and the subsequent robustness of an image classification model. The attacks were performed using the Fast Gradient Sign method, the Projected Gradient Descent method, and the Carlini and Wagner ... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Hamed Taherdoost and Mitra Madanchian    
In recent years, artificial intelligence (AI) has seen remarkable advancements, stretching the limits of what is possible and opening up new frontiers. This comparative review investigates the evolving landscape of AI advancements, providing a thorough e... ver más
Revista: AI    Formato: Electrónico

 
en línea
Afnan Alotaibi and Murad A. Rassam    
Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting malicious attacks befo... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Amani Alqarni and Hamoud Aljamaan    
Software defect prediction is an active research area. Researchers have proposed many approaches to overcome the imbalanced defect problem and build highly effective machine learning models that are not biased towards the majority class. Generative adver... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing    
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
James Msughter Adeke, Guangjie Liu, Junjie Zhao, Nannan Wu and Hafsat Muhammad Bashir    
Machine learning (ML) models are essential to securing communication networks. However, these models are vulnerable to adversarial examples (AEs), in which malicious inputs are modified by adversaries to produce the desired output. Adversarial training i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng    
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Yuting Guan, Junjiang He, Tao Li, Hui Zhao and Baoqiang Ma    
SQL injection is a highly detrimental web attack technique that can result in significant data leakage and compromise system integrity. To counteract the harm caused by such attacks, researchers have devoted much attention to the examination of SQL injec... ver más
Revista: Future Internet    Formato: Electrónico

« Anterior     Página: 1 de 7     Siguiente »