|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Dominic Lightbody, Duc-Minh Ngo, Andriy Temko, Colin C. Murphy and Emanuel Popovici
This study proposes the wider use of non-intrusive side-channel power data in cybersecurity for intrusion detection. An in-depth analysis of side-channel IoT power behaviour is performed on two well-known IoT devices?a Raspberry Pi 3 model B and a Dragon...
ver más
|
|
|
|
|
|
|
Mengjing Gao, Tian Yan, Quancheng Li, Wenxing Fu and Jin Zhang
As defense technology develops, it is essential to study the pursuit?evasion (PE) game problem in hypersonic vehicles, especially in the situation where a head-on scenario is created. Under a head-on situation, the hypersonic vehicle?s speed advantage is...
ver más
|
|
|
|
|
|
|
Jishu K. Medhi, Rui Liu, Qianlong Wang and Xuhui Chen
Multiple unmanned aerial vehicle (multi-UAV) systems have gained significant attention in applications, such as aerial surveillance and search and rescue missions. With the recent development of state-of-the-art multiagent reinforcement learning (MARL) a...
ver más
|
|
|
|
|
|
|
Karthikeyan Saminathan, Sai Tharun Reddy Mulka, Sangeetha Damodharan, Rajagopal Maheswar and Josip Lorincz
The COVID-19 pandemic made all organizations and enterprises work on cloud platforms from home, which greatly facilitates cyberattacks. Employees who work remotely and use cloud-based platforms are chosen as targets for cyberattacks. For that reason, cyb...
ver más
|
|
|
|
|
|
|
Konstantinos V. Kostas and Maria Manousaridou
In this work, supervised Machine Learning (ML) techniques were employed to solve the forward and inverse problems of airfoil and hydrofoil design. The forward problem pertains to the prediction of a foil?s aerodynamic or hydrodynamic performance given it...
ver más
|
|
|
|
|
|
|
Raz Lapid, Zvika Haramaty and Moshe Sipper
Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating advers...
ver más
|
|
|
|
|
|
|
Khalid Al-Begain, Murad Khan, Basil Alothman, Chibli Joumaa and Ebrahim Alrashed
The Internet of Things (IoT) has become an integral part of our daily life as it is growing in many fields, such as engineering, e-health, smart homes, smart buildings, agriculture, weather forecasting, etc. However, the growing number of IoT devices and...
ver más
|
|
|
|
|
|
|
Yunlong Ma, Qiaogao Huang, Guang Pan and Pengcheng Gao
Collective motion is a unique biological habit of manta rays. As the most basic unit, the hydrodynamic mechanism of tandem gliding deserves further study. In this paper, a numerical simulation method was used to explore the influence of the front-to-back...
ver más
|
|
|
|
|
|
|
Joseph Pedersen, Rafael Muñoz-Gómez, Jiangnan Huang, Haozhe Sun, Wei-Wei Tu and Isabelle Guyon
We address the problem of defending predictive models, such as machine learning classifiers (Defender models), against membership inference attacks, in both the black-box and white-box setting, when the trainer and the trained model are publicly released...
ver más
|
|
|
|