|
|
|
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner...
ver más
|
|
|
|
|
|
|
Xinyu Jia, Xueqin Jiang, Zhiyong Li, Jiong Mu, Yuchao Wang and Yupeng Niu
The occurrence of pests at high frequencies has been identified as a major cause of reduced citrus yields, and early detection and prevention are of great significance to pest control. At present, studies related to citrus pest identification using deep ...
ver más
|
|
|
|
|
|
|
Bin Yang, Muhammad Haseeb Arshad and Qing Zhao
Powered by advances in information and internet technologies, network-based applications have developed rapidly, and cybersecurity has grown more critical. Inspired by Reinforcement Learning (RL) success in many domains, this paper proposes an Intrusion ...
ver más
|
|
|
|
|
|
|
Zhirui Luo, Qingqing Li and Jun Zheng
Transfer learning using pre-trained deep neural networks (DNNs) has been widely used for plant disease identification recently. However, pre-trained DNNs are susceptible to adversarial attacks which generate adversarial samples causing DNN models to make...
ver más
|
|
|
|
|
|
|
Aminollah Khormali and Jiann-Shiun Yuan
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee...
ver más
|
|
|
|
|
|
|
Nikolay Kalashnikov,Olexandr Kokhanov,Olexandr Iakovenko,Nataliia Kushnirenko
Pág. 37 - 42
This paper addresses the task of developing a steganographic method to hide information, resistant to analysis based on the Rich model (which includes several different submodels), using statistical indicators for the distribution of the pairs of coeffic...
ver más
|
|
|
|
|
|
|
Yong Fang, Cheng Huang, Yijia Xu and Yang Li
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a...
ver más
|
|
|
|