Search
Search Results
-
PLC Network Integrity Solution
Assuring that the power line has not been altered or tampered with in an unauthorized manner is key for maintaining the integrity of Power Line... -
Cybersecurity and the AI Silver Bullet
The implementation of artificial intelligence (AI) is rapidly growing in many fields. AI tools now aid decision-makers by providing insights through... -
Designing and Implementing an Interactive Cloud Platform for Teaching Machine Learning with Medical Data
Machine learning (ML), especially deep learning (DL), is a field of research that has recently attracted enormous attention and is currently evolving... -
Who Guards the Guardians? On Robustness of Deep Neural Networks
In this chapter, we describe available vectors of attacks against discriminative Deep Neural Networks. We consider a wide range of attacks that aim... -
Safeguarding the Future of Artificial Intelligence: An AI Blueprint
Current developments in artificial intelligence, such as ChatGPT, Stable Diffusion or Deep Fakes, pose new challenges to our society. It is becoming... -
To Know What You Do Not Know: Challenges for Explainable AI for Security and Threat Intelligence
Human analysts working for threat intelligence leverage tools powered by artificial intelligence to routinely assemble actionable intelligence. Yet,... -
On Protection of the Next-Generation Mobile Networks Against Adversarial Examples
As artificial intelligence (AI) has become an integral part of modern mobile networks, there is an increasing concern about vulnerabilities of... -
Detecting Web Application DAST Attacks in Large-Scale Event Data
This chapter proposes data-centric machine learning to protect web applications from dynamic application security testing (DAST) attacks. DAST... -
Fuzzy Machine Learning for Smart Grid Instability Detection
The smart grid is an advanced power system concept that integrates electricity and communication within system networks. Its primary goal is to... -
Enhancing Embedded IoT Systems for Intrusion Detection Using a Hybrid Model
Intrusion detection in Internet of Things (IoT) networks is a critical challenge due to the dynamic and evolving nature of cyber threats. To address... -
Telling Data Stories, the Way Averroes Wrote His Commentaries – A Three-Level Approach to Facilitate Data-Driven Decision Making
Data stories are a narrative format that presents information and data in a way that is easy to understand and engage with. They contain various... -
Data Literacy in Public Libraries in Croatia: An Empirical Study
The importance of data literacy in a data-driven world is ever-increasing. There are many definitions for the term data literacy, suggesting... -
Maturity Model as the Tool for Information/Data Literacy Assessment
The aim of this article is to present the similarities between two assessment tools: data literacy (DL) rubrics and research data management services... -
Improving STEM Competences by Using Artificial Intelligence to Generate Video Games Based on Student Written Stories
In this paper the results of conducted research as a prerequisite for a model developed in order to foster STEM competences of non-STEM students are... -
Differential Private Identification Protection for Face Images
In this chapter, we focus on providing theory guarantee to improve fundamental face de-identification. We propose IdentityDP, a face anonymization... -
Advances in Privacy Preservation Technologies
The rapid development of information technology and the continuous evolution of new business paradigms and personalized services have promoted... -
The Future Development Trends of Privacy Computing
We propose to abstract, condense, and foresee the future development trends of privacy computing from three aspects: the research scope of privacy... -
A Survey on Blockchain Abnormal Transaction Detection
Blockchain technology has undergone rapid development in recent years, transactions on Blockchains, represented by prominent examples such as Bitcoin... -
An Optimized Scheme of Federated Learning Based on Differential Privacy
With the arrival of the Web3 era, data has seen an explosive growth. The use of differential privacy mechanisms in federated learning has been... -
IntelliCon: Confidence-Based Approach for Fine-Grained Vulnerability Analysis in Smart Contracts
Ethereum smart contracts are programs that execute transactions on a distributed ledger platform without intermediaries. However, they are prone to...