Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
A detailed survey on federated learning attacks and defenses
HS Sikandar, H Waheed, S Tahir, SUR Malik… - Electronics, 2023 - mdpi.com
A traditional centralized method of training AI models has been put to the test by the
emergence of data stores and public privacy concerns. To overcome these issues, the …
emergence of data stores and public privacy concerns. To overcome these issues, the …
Vulnerabilities in federated learning
N Bouacida, P Mohapatra - IEEe Access, 2021 - ieeexplore.ieee.org
With more regulations tackling the protection of users' privacy-sensitive data in recent years,
access to such data has become increasingly restricted. A new decentralized training …
access to such data has become increasingly restricted. A new decentralized training …
A novel deep federated learning-based model to enhance privacy in critical infrastructure systems
Deep learning (DL) can provide critical infrastructure operators with valuable insights and
predictive capabilities to help them make more informed decisions, improving system's …
predictive capabilities to help them make more informed decisions, improving system's …
Adversarial robustness for tabular data through cost and utility awareness
Many safety-critical applications of machine learning, such as fraud or abuse detection, use
data in tabular domains. Adversarial examples can be particularly damaging for these …
data in tabular domains. Adversarial examples can be particularly damaging for these …
Towards resilient artificial intelligence: Survey and research issues
Artificial intelligence (AI) systems are becoming critical components of today's IT landscapes.
Their resilience against attacks and other environmental influences needs to be ensured just …
Their resilience against attacks and other environmental influences needs to be ensured just …
Federated learning vulnerabilities, threats and defenses: A systematic review and future directions
S Almutairi, A Barnawi - Internet of Things, 2023 - Elsevier
Today, a broad range of items, ranging from smartphones to smart cars are connected
together via the Internet, also known as the Internet of Things (IoT). The IoT is powered by …
together via the Internet, also known as the Internet of Things (IoT). The IoT is powered by …
Amaretto: An active learning framework for money laundering detection
D Labanca, L Primerano… - IEEE …, 2022 - ieeexplore.ieee.org
Monitoring financial transactions is a critical Anti-Money Laundering (AML) obligation for
financial institutions. In recent years, machine learning-based transaction monitoring …
financial institutions. In recent years, machine learning-based transaction monitoring …
Lookin'Out My Backdoor! Investigating Backdooring Attacks Against DL-driven Malware Detectors
Given their generalization capabilities, deep learning algorithms may represent a powerful
weapon in the arsenal of antivirus developers. Nevertheless, recent works in different …
weapon in the arsenal of antivirus developers. Nevertheless, recent works in different …
[PDF][PDF] A Bayesian attack-network modeling approach to mitigating malware-based banking cyberattacks
A Zimba - Int J Comput Netw Inf Secur, 2022 - academia.edu
According to Cybersecurity Ventures, the damage related to cybercrime is projected to reach
$6 trillion annually by 2021. The majority of the cyberattacks are directed at financial …
$6 trillion annually by 2021. The majority of the cyberattacks are directed at financial …