بحث بسيط
السجلات المعروضة 361 -- 370 من 396
Fake visual content detection using two-stream convolutional neural networks
(
Springer Science and Business Media Deutschland GmbH
, 2022 , Article)
Rapid progress in adversarial learning has enabled the generation of realistic-looking fake visual content. To distinguish between fake and real visual content, several detection techniques have been proposed. The performance ...
Making federated learning robust to adversarial attacks by learning data and model association
(
Elsevier
, 2022 , Article)
One of the key challenges in federated learning (FL) is the detection of malicious parameter updates. In a typical FL setup, the presence of malicious client(s) can potentially demolish the overall training of the shared ...
Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to its ability to achieve high performance in a range of environments with little manual oversight. Despite its great advantages, DRL ...
Get out of the BAG! Silos in AI Ethics Education: Unsupervised Topic Modeling Analysis of Global AI Curricula
(
AI Access Foundation
, 2022 , Article)
The domain of Artificial Intelligence (AI) ethics is not new, with discussions going back at least 40 years. Teaching the principles and requirements of ethical AI to students is considered an essential part of this domain, ...
A deep dive into COVID-19-related messages on WhatsApp in Pakistan
(
Springer
, 2022 , Article)
The spread of COVID-19 and the lockdowns that followed led to an increase in activity on online social networks. This has resulted in users sharing unfiltered and unreliable information on social networks like WhatsApp, ...
Smart Cities from the Perspective of Systems
(
MDPI
, 2022 , Article)
Modern cities are complex adaptive systems in which there is a lot of dependency and interaction between the various stakeholders, components, and subsystems. The use of digital Information and Communications Technology ...
A Generative Model to Synthesize EEG Data for Epileptic Seizure Prediction
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Objective: Scarcity of good quality electroencephalography (EEG) data is one of the roadblocks for accurate seizure prediction. This work proposes a deep convolutional generative adversarial network (DCGAN) to generate ...
Secure Bluetooth Communication in Smart Healthcare Systems: A Novel Community Dataset and Intrusion Detection System
(
MDPI
, 2022 , Article)
Smart health presents an ever-expanding attack surface due to the continuous adoption of a broad variety of Internet of Medical Things (IoMT) devices and applications. IoMT is a common approach to smart city solutions that ...
Tamp-X: Attacking explainable natural language classifiers through tampered activations
(
Elsevier
, 2022 , Article)
While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works have shown that the decisions made by DNNs ...
Federated Learning over Energy Harvesting Wireless Networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2022 , Article)
In this article, the deployment of federated learning (FL) is investigated in an energy harvesting wireless network in which the base stations (BSs) employs massive multiple-input-multiple-output (MIMO) to serve a set of ...