|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Jiaqi Zhao, Ming Xu, Yunzhi Chen and Guoliang Xu
Nowdays, DNNs (Deep Neural Networks) are widely used in the field of DDoS attack detection. However, designing a good DNN architecture relies on the designer?s experience and requires considerable work. In this paper, a GA (genetic algorithm) is used to ...
ver más
|
|
|
|
|
|
|
Shunyi Liao, Feng Gao, Lei Feng, Jiemin Wu, Zexia Wang and Wangyang Chen
Out-of-hospital cardiac arrest (OHCA) causes a high mortality rate each year, which is a threat to human well-being and health. An automated external defibrillator (AED) is an effective device for heart attack-related diseases and is a panacea to save OH...
ver más
|
|
|
|
|
|
|
Feng Wang, Peng Huang, Rongxin Zhao, Huayong Wu, Mengjin Sun, Zijie Zhou and Yun Xing
Debris poses multifaceted risks and jeopardizes various aspects of the environment, human health, safety, and infrastructure. The debris trajectory in turbulent wind flow is more dispersed due to the inherent randomness of the turbulent winds. This paper...
ver más
|
|
|
|
|
|
|
Andreea Bianca Popescu, Ioana Antonia Taca, Anamaria Vizitiu, Cosmin Ioan Nita, Constantin Suciu, Lucian Mihai Itu and Alexandru Scafa-Udriste
Deep learning (DL)-based algorithms have demonstrated remarkable results in potentially improving the performance and the efficiency of healthcare applications. Since the data typically needs to leave the healthcare facility for performing model training...
ver más
|
|
|
|
|
|
|
Songshen Han, Kaiyong Xu, Songhui Guo, Miao Yu and Bo Yang
Automatic Speech Recognition (ASR) provides a new way of human-computer interaction. However, it is vulnerable to adversarial examples, which are obtained by deliberately adding perturbations to the original audios. Thorough studies on the universal feat...
ver más
|
|
|
|
|
|
|
Muqing He, Deqing Zou, Weizhong Qiang, Shouhuai Xu, Wenbo Wu and Hai Jin
In the context of life sciences, the rapid biotechnical development leads to the creation of huge amounts of biological data. The use of such data naturally brings concerns on human genetic privacy breaches, which also discourage biological data sharing....
ver más
|
|
|
|
|
|
|
Zesheng Chen, Li-Chi Chang, Chao Chen, Guoping Wang and Zhuming Bi
Speaker verification systems use human voices as an important biometric to identify legitimate users, thus adding a security layer to voice-controlled Internet-of-things smart homes against illegal access. Recent studies have demonstrated that speaker ve...
ver más
|
|
|
|