|
|
|
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho...
ver más
|
|
|
|
|
|
|
Adam James Fenton
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary...
ver más
|
|
|
|
|
|
|
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p...
ver más
|
|
|
|
|
|
|
Alexandros Z. Spyropoulos, Evangelos Ioannidis and Ioannis Antoniou
The early intervention of law enforcement authorities to prevent an impending terrorist attack is of utmost importance to ensuring economic, financial, and social stability. From our previously published research, the key individuals who play a vital rol...
ver más
|
|
|
|
|
|
|
Tala Talaei Khoei and Naima Kaabouch
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect these a...
ver más
|
|
|
|
|
|
|
Raluca Chitic, Ali Osman Topal and Franck Leprévost
Recently, convolutional neural networks (CNNs) have become the main drivers in many image recognition applications. However, they are vulnerable to adversarial attacks, which can lead to disastrous consequences. This paper introduces ShuffleDetect as a n...
ver más
|
|
|
|
|
|
|
Fahim Sufi
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe...
ver más
|
|
|
|
|
|
|
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate...
ver más
|
|
|
|
|
|
|
Qiong Chen, Hongyu Zhang, Yui-yip Lau, Kaiyuan Liu, Adolf K. Y. Ng, Weijie Chen, Qingmei Liao and Maxim A. Dulebenets
Maritime transportation is vital for the movement of cargo between different continents and distant locations but can be disrupted by the frequent occurrence of pirate attacks. Based on the pirate attacks from July 1994 to December 2019, a spatial analys...
ver más
|
|
|
|
|
|
|
Eugene Ilyushin,Dmitry Namiot,Ivan Chizhov
Pág. 17 - 22
The paper deals with the problem of adversarial attacks on machine learning systems. Such attacks are understood as special actions on the elements of the machine learning pipeline (training data, the model itself, test data) in order to either achieve t...
ver más
|
|
|
|