Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3146405
Abstract: Machine learning algorithms represent the intelligence that controls many information systems and applications around us. As such, they are targeted by attackers to impact their decisions. Text created by machine learning algorithms has many types…
read more here.
Keywords:
machine;
machine learning;
adversarial machine;
literature ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3206012
Abstract: Next-generation communication networks, also known as NextG or 5G and beyond, are the future data transmission systems that aim to connect a large amount of Internet of Things (IoT) devices, systems, applications, and consumers at…
read more here.
Keywords:
intelligent reflecting;
reflecting surfaces;
machine learning;
learning attacks ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Defence Science Journal"
DOI: 10.14429/dsj.68.12371
Abstract: The changing nature of warfare has seen a paradigm shift from the conventional to asymmetric, contactless warfare such as information and cyber warfare. Excessive dependence on information and communication technologies, cloud infrastructures, big data analytics,…
read more here.
Keywords:
cyber warfare;
adversarial machine;
machine learning;
warfare ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Applied Sciences"
DOI: 10.3390/app13106001
Abstract: Internet of Things (IoT) technologies serve as a backbone of cutting-edge intelligent systems. Machine Learning (ML) paradigms have been adopted within IoT environments to exploit their capabilities to mine complex patterns. Despite the reported promising…
read more here.
Keywords:
machine;
machine learning;
survey;
adversarial machine ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "Entropy"
DOI: 10.3390/e24081047
Abstract: This paper studies the privacy of wireless communications from an eavesdropper that employs a deep learning (DL) classifier to detect transmissions of interest. There exists one transmitter that transmits to its receiver in the presence…
read more here.
Keywords:
adversarial perturbation;
machine learning;
learning nextg;
adversarial machine ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Future Internet"
DOI: 10.3390/fi15020062
Abstract: Concerns about cybersecurity and attack methods have risen in the information age. Many techniques are used to detect or deter attacks, such as intrusion detection systems (IDSs), that help achieve security goals, such as detecting…
read more here.
Keywords:
intrusion detection;
machine;
attacks intrusion;
machine learning ... See more keywords