We are improving our search experience. To check which content you have full access to, or for advanced search, go back to the old search.

Search

Please fill in this field.
Filters applied:

Search Results

Showing 61-80 of 2,529 results
  1. PLC Network Integrity Solution

    Assuring that the power line has not been altered or tampered with in an unauthorized manner is key for maintaining the integrity of Power Line...
    Javier Hernandez Fernandez, Aymen Omri, Roberto Di Pietro in Physical Layer Security in Power Line Communications
    Chapter 2024
  2. Cybersecurity and the AI Silver Bullet

    The implementation of artificial intelligence (AI) is rapidly growing in many fields. AI tools now aid decision-makers by providing insights through...
    Anton Holmström, Daniel Innala Ahlmark, ... Åsa Ericson in Artificial Intelligence for Security
    Chapter 2024
  3. Designing and Implementing an Interactive Cloud Platform for Teaching Machine Learning with Medical Data

    Machine learning (ML), especially deep learning (DL), is a field of research that has recently attracted enormous attention and is currently evolving...
    Frederic Jonske, Kevin Osthues, ... Johannes Kraus in Artificial Intelligence for Security
    Chapter 2024
  4. Who Guards the Guardians? On Robustness of Deep Neural Networks

    In this chapter, we describe available vectors of attacks against discriminative Deep Neural Networks. We consider a wide range of attacks that aim...
    Misha Glazunov, Apostolis Zarras in Artificial Intelligence for Security
    Chapter 2024
  5. Safeguarding the Future of Artificial Intelligence: An AI Blueprint

    Current developments in artificial intelligence, such as ChatGPT, Stable Diffusion or Deep Fakes, pose new challenges to our society. It is becoming...
    Alexander Adrowitzer, Marlies Temper, ... Oliver Eigner in Artificial Intelligence for Security
    Chapter 2024
  6. To Know What You Do Not Know: Challenges for Explainable AI for Security and Threat Intelligence

    Human analysts working for threat intelligence leverage tools powered by artificial intelligence to routinely assemble actionable intelligence. Yet,...
    Sarah van Gerwen, Jorge Constantino, ... Fabio Massacci in Artificial Intelligence for Security
    Chapter 2024
  7. On Protection of the Next-Generation Mobile Networks Against Adversarial Examples

    As artificial intelligence (AI) has become an integral part of modern mobile networks, there is an increasing concern about vulnerabilities of...
    Mikhail Zolotukhin, Di Zhang, Timo Hämäläinen in Artificial Intelligence for Security
    Chapter 2024
  8. Detecting Web Application DAST Attacks in Large-Scale Event Data

    This chapter proposes data-centric machine learning to protect web applications from dynamic application security testing (DAST) attacks. DAST...
    Pojan Shahrivar, Stuart Millar in Artificial Intelligence for Security
    Chapter 2024
  9. Fuzzy Machine Learning for Smart Grid Instability Detection

    The smart grid is an advanced power system concept that integrates electricity and communication within system networks. Its primary goal is to...
    Fabio Martinelli, Francesco Mercaldo, Antonella Santone in Artificial Intelligence for Security
    Chapter 2024
  10. Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid Model

    Intrusion detection in Internet of Things (IoT) networks is a critical challenge due to the dynamic and evolving nature of cyber threats. To address...
    Mansour Alqarni, Akramul Azim in Artificial Intelligence for Security
    Chapter 2024
  11. Telling Data Stories, the Way Averroes Wrote His Commentaries – A Three-Level Approach to Facilitate Data-Driven Decision Making

    Data stories are a narrative format that presents information and data in a way that is easy to understand and engage with. They contain various...
    Vincent de Vevey, Marielle Guirlet, ... René Schneider in Information Experience and Information Literacy
    Conference paper 2024
  12. Data Literacy in Public Libraries in Croatia: An Empirical Study

    The importance of data literacy in a data-driven world is ever-increasing. There are many definitions for the term data literacy, suggesting...
    Conference paper 2024
  13. Maturity Model as the Tool for Information/Data Literacy Assessment

    The aim of this article is to present the similarities between two assessment tools: data literacy (DL) rubrics and research data management services...
    Conference paper 2024
  14. Improving STEM Competences by Using Artificial Intelligence to Generate Video Games Based on Student Written Stories

    In this paper the results of conducted research as a prerequisite for a model developed in order to foster STEM competences of non-STEM students are...
    Ivana Ogrizek Biškupić, Mario Konecki, Mladen Konecki in Information Experience and Information Literacy
    Conference paper 2024
  15. Differential Private Identification Protection for Face Images

    In this chapter, we focus on providing theory guarantee to improve fundamental face de-identification. We propose IdentityDP, a face anonymization...
    Chapter 2024
  16. Advances in Privacy Preservation Technologies

    The rapid development of information technology and the continuous evolution of new business paradigms and personalized services have promoted...
    Fenghua Li, Hui Li, Ben Niu in Privacy Computing
    Chapter 2024
  17. The Future Development Trends of Privacy Computing

    We propose to abstract, condense, and foresee the future development trends of privacy computing from three aspects: the research scope of privacy...
    Fenghua Li, Hui Li, Ben Niu in Privacy Computing
    Chapter 2024
  18. A Survey on Blockchain Abnormal Transaction Detection

    Blockchain technology has undergone rapid development in recent years, transactions on Blockchains, represented by prominent examples such as Bitcoin...
    Shuai Liu, Bo Cui, Wenhan Hou in Blockchain and Trustworthy Systems
    Conference paper 2024
  19. An Optimized Scheme of Federated Learning Based on Differential Privacy

    With the arrival of the Web3 era, data has seen an explosive growth. The use of differential privacy mechanisms in federated learning has been...
    Yang Li, ** Xu, ... **uli Wang in Blockchain and Trustworthy Systems
    Conference paper 2024
  20. IntelliCon: Confidence-Based Approach for Fine-Grained Vulnerability Analysis in Smart Contracts

    Ethereum smart contracts are programs that execute transactions on a distributed ledger platform without intermediaries. However, they are prone to...
    Yiming Shen, Kunhua Li, ... **aoqi Li in Blockchain and Trustworthy Systems
    Conference paper 2024
Did you find what you were looking for? Share feedback.