|
|
|
Mohammad Javad Rajaei and Qusay H. Mahmoud
The popularity of cryptocurrencies has skyrocketed in recent years, with blockchain technologies enabling the development of new digital assets. However, along with their advantages, such as lower transaction costs, increased security, and transactional ...
ver más
|
|
|
|
|
|
|
Paria Sarzaeim, Qusay H. Mahmoud, Akramul Azim, Gary Bauer and Ian Bowles
Smart policing refers to the use of advanced technologies such as artificial intelligence to enhance policing activities in terms of crime prevention or crime reduction. Artificial intelligence tools, including machine learning and natural language proce...
ver más
|
|
|
|
|
|
|
Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the thr...
ver más
|
|
|
|
|
|
|
Shihab Shahriar Hazari and Qusay H. Mahmoud
A blockchain is a distributed ledger forming a distributed consensus on a history of transactions, and is the underlying technology for the Bitcoin cryptocurrency. Its applications are far beyond the financial sector. The transaction verification process...
ver más
|
|
|
|
|
|
|
Yosef Ashibani, Dylan Kauling and Qusay H. Mahmoud
|
|
|
|
|
|
|
Harsh V. P. Singh and Qusay H. Mahmoud
-
|
|
|
|
|
|
|
Michael Lescisin, Qusay H. Mahmoud and Anca Cioraca
Software security is a component of software development that should be integrated throughout its entire development lifecycle, and not simply as an afterthought. If security vulnerabilities are caught early in development, they can be fixed before the s...
ver más
|
|
|
|