65   Artículos

 
en línea
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu    
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Adam James Fenton    
This paper examines hybrid threats to maritime transportation systems and their governance responses; focusing on the congested Straits of Malacca and Singapore (SOMS) as an illustrative case study. The methodology combines secondary sources with primary... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Yussuf Ahmed, Muhammad Ajmal Azad and Taufiq Asyhari    
In recent years, there has been a notable surge in both the complexity and volume of targeted cyber attacks, largely due to heightened vulnerabilities in widely adopted technologies. The Prediction and detection of early attacks are vital to mitigating p... ver más
Revista: Information    Formato: Electrónico

 
en línea
Alexandros Z. Spyropoulos, Evangelos Ioannidis and Ioannis Antoniou    
The early intervention of law enforcement authorities to prevent an impending terrorist attack is of utmost importance to ensuring economic, financial, and social stability. From our previously published research, the key individuals who play a vital rol... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tala Talaei Khoei and Naima Kaabouch    
Intrusion Detection Systems are expected to detect and prevent malicious activities in a network, such as a smart grid. However, they are the main systems targeted by cyber-attacks. A number of approaches have been proposed to classify and detect these a... ver más
Revista: Information    Formato: Electrónico

 
en línea
Raluca Chitic, Ali Osman Topal and Franck Leprévost    
Recently, convolutional neural networks (CNNs) have become the main drivers in many image recognition applications. However, they are vulnerable to adversarial attacks, which can lead to disastrous consequences. This paper introduces ShuffleDetect as a n... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Fahim Sufi    
Utilizing social media data is imperative in comprehending critical insights on the Russia?Ukraine cyber conflict due to their unparalleled capacity to provide real-time information dissemination, thereby enabling the timely tracking and analysis of cybe... ver más
Revista: Information    Formato: Electrónico

 
en línea
Minxiao Wang, Ning Yang, Dulaj H. Gunasinghe and Ning Weng    
Utilizing machine learning (ML)-based approaches for network intrusion detection systems (NIDSs) raises valid concerns due to the inherent susceptibility of current ML models to various threats. Of particular concern are two significant threats associate... ver más
Revista: Computers    Formato: Electrónico

 
en línea
Qiong Chen, Hongyu Zhang, Yui-yip Lau, Kaiyuan Liu, Adolf K. Y. Ng, Weijie Chen, Qingmei Liao and Maxim A. Dulebenets    
Maritime transportation is vital for the movement of cargo between different continents and distant locations but can be disrupted by the frequent occurrence of pirate attacks. Based on the pirate attacks from July 1994 to December 2019, a spatial analys... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Eugene Ilyushin,Dmitry Namiot,Ivan Chizhov     Pág. 17 - 22
The paper deals with the problem of adversarial attacks on machine learning systems. Such attacks are understood as special actions on the elements of the machine learning pipeline (training data, the model itself, test data) in order to either achieve t... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »