Explainable AI (XAI): Core ideas, techniques, and solutions
As our dependence on intelligent machines continues to grow, so does the demand for more
transparent and interpretable models. In addition, the ability to explain the model generally …
transparent and interpretable models. In addition, the ability to explain the model generally …
Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …
Cross-entropy loss functions: Theoretical analysis and applications
Cross-entropy is a widely used loss function in applications. It coincides with the logistic loss
applied to the outputs of a neural network, when the softmax is used. But, what guarantees …
applied to the outputs of a neural network, when the softmax is used. But, what guarantees …
Understanding the robustness in vision transformers
Recent studies show that Vision Transformers (ViTs) exhibit strong robustness against
various corruptions. Although this property is partly attributed to the self-attention …
various corruptions. Although this property is partly attributed to the self-attention …
Industry 4.0 vs. Industry 5.0: Co-existence, transition, or a hybrid
Smart manufacturing is being shaped nowadays by two different paradigms: Industry 4.0
proclaims transition to digitalization and automation of processes while emerging Industry …
proclaims transition to digitalization and automation of processes while emerging Industry …
Self-supervised learning of adversarial example: Towards good generalizations for deepfake detection
Recent studies in deepfake detection have yielded promising results when the training and
testing face forgeries are from the same dataset. However, the problem remains challenging …
testing face forgeries are from the same dataset. However, the problem remains challenging …
Membership inference attacks on machine learning: A survey
Machine learning (ML) models have been widely applied to various applications, including
image classification, text generation, audio recognition, and graph data analysis. However …
image classification, text generation, audio recognition, and graph data analysis. However …
Enhancing the transferability of adversarial attacks through variance tuning
Deep neural networks are vulnerable to adversarial examples that mislead the models with
imperceptible perturbations. Though adversarial attacks have achieved incredible success …
imperceptible perturbations. Though adversarial attacks have achieved incredible success …
When machine learning meets privacy: A survey and outlook
The newly emerged machine learning (eg, deep learning) methods have become a strong
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
driving force to revolutionize a wide range of industries, such as smart healthcare, financial …
Recent advances in adversarial training for adversarial robustness
Adversarial training is one of the most effective approaches defending against adversarial
examples for deep learning models. Unlike other defense strategies, adversarial training …
examples for deep learning models. Unlike other defense strategies, adversarial training …