Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems

M Macas, C Wu, W Fuertes - Expert Systems with Applications, 2024 - Elsevier
Over the last few years, the adoption of machine learning in a wide range of domains has
been remarkable. Deep learning, in particular, has been extensively used to drive …

Cybersecurity in unmanned aerial vehicles: A review

W Shafik, SM Matinkhah, F Shokoor - International Journal on Smart …, 2023 - sciendo.com
Context: With the rapid advancement of unmanned aerial vehicle (UAV) technology,
ensuring these autonomous systems' security and integrity is paramount. UAVs are …

Rumor Detection with a novel graph neural network approach

T Liu, Q Cai, C Xu, B Hong, F Ni, Y Qiao… - arxiv preprint arxiv …, 2024 - arxiv.org
The wide spread of rumors on social media has caused a negative impact on people's daily
life, leading to potential panic, fear, and mental health problems for the public. How to …

[HTML][HTML] Enhanced data mining and visualization of sensory-graph-Modeled datasets through summarization

SJ Hashmi, B Alabdullah, N Al Mudawi, A Algarni… - Sensors, 2024 - mdpi.com
The acquisition, processing, mining, and visualization of sensory data for knowledge
discovery and decision support has recently been a popular area of research and …

Image Captioning in news report scenario

T Liu, Q Cai, C Xu, B Hong, J **ong, Y Qiao… - arxiv preprint arxiv …, 2024 - arxiv.org
Image captioning strives to generate pertinent captions for specified images, situating itself
at the crossroads of Computer Vision (CV) and Natural Language Processing (NLP). This …

LESSON: Multi-label adversarial false data injection attack for deep learning locational detection

J Tian, C Shen, B Wang, X **a… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Deep learning methods can not only detect false data injection attacks (FDIA) but also locate
attacks of FDIA. Although adversarial false data injection attacks (AFDIA) based on deep …

Joint adversarial example and false data injection attacks for state estimation in power systems

J Tian, B Wang, Z Wang, K Cao, J Li… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Although state estimation using a bad data detector (BDD) is a key procedure employed in
power systems, the detector is vulnerable to false data injection attacks (FDIAs). Substantial …

Cyber security perspectives in public spaces: drone case study

W Shafik - Handbook of research on cybersecurity risk in …, 2023 - igi-global.com
As the public use drones (aircraft that can operate semi or autonomous), sometimes referred
to as unmanned aerial vehicles or automotive aircrafts, to ease daily people's lifestyles …

[HTML][HTML] Fuzzy decision-making framework for explainable golden multi-machine learning models for real-time adversarial attack detection in Vehicular Ad-hoc …

AS Albahri, RA Hamid, AR Abdulnabi, OS Albahri… - Information …, 2024 - Elsevier
This paper addresses various issues in the literature concerning adversarial attack detection
in Vehicular Ad-hoc Networks (VANETs). These issues include the failure to consider both …

Vehicle recognition pipeline via DeepSort on aerial image datasets

M Hanzla, MO Yusuf, N Al Mudawi, T Sadiq… - Frontiers in …, 2024 - frontiersin.org
Introduction Unmanned aerial vehicles (UAVs) are widely used in various computer vision
applications, especially in intelligent traffic monitoring, as they are agile and simplify …