Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …
been remarkable. Deep learning, in particular, has been extensively used to drive …
Cybersecurity in unmanned aerial vehicles: A review
Context: With the rapid advancement of unmanned aerial vehicle (UAV) technology,
ensuring these autonomous systems' security and integrity is paramount. UAVs are …
ensuring these autonomous systems' security and integrity is paramount. UAVs are …
Rumor Detection with a novel graph neural network approach
The wide spread of rumors on social media has caused a negative impact on people's daily
life, leading to potential panic, fear, and mental health problems for the public. How to …
life, leading to potential panic, fear, and mental health problems for the public. How to …
[HTML][HTML] Enhanced data mining and visualization of sensory-graph-Modeled datasets through summarization
The acquisition, processing, mining, and visualization of sensory data for knowledge
discovery and decision support has recently been a popular area of research and …
discovery and decision support has recently been a popular area of research and …
Image Captioning in news report scenario
Image captioning strives to generate pertinent captions for specified images, situating itself
at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This …
at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This …
LESSON: Multi-label adversarial false data injection attack for deep learning locational detection
Deep learning methods can not only detect false data injection attacks (FDIA) but also locate
attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep …
attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep …
Joint adversarial example and false data injection attacks for state estimation in power systems
Although state estimation using a bad data detector (BDD) is a key procedure employed in
power systems, the detector is vulnerable to false data injection attacks (FDIAs). Substantial …
power systems, the detector is vulnerable to false data injection attacks (FDIAs). Substantial …
Cyber security perspectives in public spaces: drone case study
W Shafik - Handbook of research on cybersecurity risk in …, 2023 - igi-global.com
As the public use drones (aircraft that can operate semi or autonomous), sometimes referred
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …
[HTML][HTML] Fuzzy decision-making framework for explainable golden multi-machine learning models for real-time adversarial attack detection in Vehicular Ad-hoc …
This paper addresses various issues in the literature concerning adversarial attack detection
in Vehicular Ad-hoc Networks (VANETs). These issues include the failure to consider both …
in Vehicular Ad-hoc Networks (VANETs). These issues include the failure to consider both …
Vehicle recognition pipeline via DeepSort on aerial image datasets
Introduction Unmanned aerial vehicles (UAVs) are widely used in various computer vision
applications, especially in intelligent traffic monitoring, as they are agile and simplify …
applications, especially in intelligent traffic monitoring, as they are agile and simplify …