An overview of artificial intelligence ethics
C Huang, Z Zhang, B Mao, X Yao - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Artificial intelligence (AI) has profoundly changed and will continue to change our lives. AI is
being applied in more and more fields and scenarios such as autonomous driving, medical …
being applied in more and more fields and scenarios such as autonomous driving, medical …
A survey of privacy attacks in machine learning
As machine learning becomes more widely used, the need to study its implications in
security and privacy becomes more urgent. Although the body of work in privacy has been …
security and privacy becomes more urgent. Although the body of work in privacy has been …
Attack classification of imbalanced intrusion data for IoT network using ensemble-learning-based deep neural network
With the increase in popularity of Internet of Things (IoT) and the rise in interconnected
devices, the need to foster effective security mechanism to handle vulnerabilities and risks in …
devices, the need to foster effective security mechanism to handle vulnerabilities and risks in …
[HTML][HTML] A survey on Zero touch network and Service Management (ZSM) for 5G and beyond networks
Faced with the rapid increase in smart Internet-of-Things (IoT) devices and the high demand
for new business-oriented services in the fifth-generation (5G) and beyond network, the …
for new business-oriented services in the fifth-generation (5G) and beyond network, the …
The role of artificial intelligence and machine learning in wireless networks security: Principle, practice and challenges
Security is one of the biggest challenges concerning networks and communications. The
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
problem becomes aggravated with the proliferation of wireless devices. Artificial Intelligence …
Realguard: A lightweight network intrusion detection system for IoT gateways
Cyber security has become increasingly challenging due to the proliferation of the Internet of
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …
things (IoT), where a massive number of tiny, smart devices push trillion bytes of data to the …
A blockchain-based machine learning framework for edge services in IIoT
Edge services provide an effective and superior means of real-time transmissions and rapid
processing of information in the Industrial Internet of Things (IIoT). However, the continuous …
processing of information in the Industrial Internet of Things (IIoT). However, the continuous …
Data poisoning attacks against machine learning algorithms
FA Yerlikaya, Ş Bahtiyar - Expert Systems with Applications, 2022 - Elsevier
For the past decade, machine learning technology has increasingly become popular and it
has been contributing to many areas that have the potential to influence the society …
has been contributing to many areas that have the potential to influence the society …
Normalizing flows for human pose anomaly detection
Video anomaly detection is an ill-posed problem because it relies on many parameters such
as appearance, pose, camera angle, background, and more. We distill the problem to …
as appearance, pose, camera angle, background, and more. We distill the problem to …
A survey of robustness and safety of 2d and 3d deep learning models against adversarial attacks
Benefiting from the rapid development of deep learning, 2D and 3D computer vision
applications are deployed in many safe-critical systems, such as autopilot and identity …
applications are deployed in many safe-critical systems, such as autopilot and identity …