Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Adversarial attacks and defenses in explainable artificial intelligence: A survey
Explainable artificial intelligence (XAI) methods are portrayed as a remedy for debugging
and trusting statistical and deep learning models, as well as interpreting their predictions …
and trusting statistical and deep learning models, as well as interpreting their predictions …
Trusted ai in multiagent systems: An overview of privacy and security for distributed learning
Motivated by the advancing computational capacity of distributed end-user equipment (UE),
as well as the increasing concerns about sharing private data, there has been considerable …
as well as the increasing concerns about sharing private data, there has been considerable …
Challenges and countermeasures for adversarial attacks on deep reinforcement learning
Deep reinforcement learning (DRL) has numerous applications in the real world, thanks to
its ability to achieve high performance in a range of environments with little manual …
its ability to achieve high performance in a range of environments with little manual …
Security and privacy issues in deep reinforcement learning: Threats and countermeasures
Deep Reinforcement Learning (DRL) is an essential subfield of Artificial Intelligence (AI),
where agents interact with environments to learn policies for solving complex tasks. In recent …
where agents interact with environments to learn policies for solving complex tasks. In recent …
Meta policy learning for cold-start conversational recommendation
Conversational recommender systems (CRS) explicitly solicit users' preferences for
improved recommendations on the fly. Most existing CRS solutions count on a single policy …
improved recommendations on the fly. Most existing CRS solutions count on a single policy …
A novel multi-sample generation method for adversarial attacks
Deep learning models are widely used in daily life, which bring great convenience to our
lives, but they are vulnerable to attacks. How to build an attack system with strong …
lives, but they are vulnerable to attacks. How to build an attack system with strong …
Towards resilient artificial intelligence: Survey and research issues
Artificial intelligence (AI) systems are becoming critical components of today's IT landscapes.
Their resilience against attacks and other environmental influences needs to be ensured just …
Their resilience against attacks and other environmental influences needs to be ensured just …
Data poisoning attacks against conformal prediction
The efficient and theoretically sound uncertainty quantification is crucial for building trust in
deep learning models. This has spurred a growing interest in conformal prediction (CP), a …
deep learning models. This has spurred a growing interest in conformal prediction (CP), a …
{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications
Recently, we have witnessed the success of deep reinforcement learning (DRL) in many
security applications, ranging from malware mutation to selfish blockchain mining. Like all …
security applications, ranging from malware mutation to selfish blockchain mining. Like all …
Understanding and enhancing robustness of concept-based models
Rising usage of deep neural networks to perform decision making in critical applications like
medical diagnosis and fi-nancial analysis have raised concerns regarding their reliability …
medical diagnosis and fi-nancial analysis have raised concerns regarding their reliability …