Distribution-based adversarial filter feature selection against evasion attack

PPK Chan, YC Liang, F Zhang… - 2021 International Joint …, 2021 - ieeexplore.ieee.org
Feature selection plays an important role in machine learning in order to reduce model
complexity and extract more meaningful information. The recent studies indicate that not …

Pulse2AI: An Adaptive Framework to Standardize and Process Pulsatile Wearable Sensor Data for Clinical Applications

S Huang, R Jafari, BJ Mortazavi - IEEE Open Journal of …, 2024 - ieeexplore.ieee.org
Goal: To establish Pulse2AI as a reproducible data preprocessing framework for pulsatile
signals that generate high-quality machine-learning-ready datasets from raw wearable …

Systematic literature review: Evaluating effects of adversarial attacks and attack generation methods

S Akram, SU Bazai, MI Ghafoor… - … on Energy, Power …, 2023 - ieeexplore.ieee.org
Advancement in Artificial Intelligence (AI) aims to train the Machine Learning (ML) Models in
such a way that they would be able to take decisions spontaneously, however on the other …

Evaluating adversarial learning on different types of deep learning-based intrusion detection systems using min-max optimization

R Abou Khamis - 2020 - repository.library.carleton.ca
In this research, we focus on investigating the effectiveness of different adversarial attacks
and robustness of deep learning-based Intrusion detection using different Neural networks …

[PDF][PDF] Snn under attack: are spiking deep belief networks vulnerable to adversarial examples

A Marchisio, G Nanfa, F Khalid, MA Hanif… - arXiv preprint arXiv …, 2019 - researchgate.net
Recently, many adversarial examples have emerged for Deep Neural Networks (DNNs)
causing misclassifications. However, indepth work still needs to be performed to …

[PDF][PDF] Robust computing for machine learning-based systems

MA Hanif, F Khalid, RVW Putra… - Dependable …, 2021 - library.oapen.org
Machine learning (ML) has emerged as the principal tool for performing complex tasks
which are impractical (if not impossible) to code by humans. ML techniques provide …

Activity Recognition in IoT

MM Sandhu, S Khalifa, M Portmann… - Self-Powered Internet of …, 2023 - Springer
Due to the advancements in technology and microelectromechanical systems, there is an
exceptional development in the capabilities of sensors and smart devices. Nowadays …

Adding adversarial robustness to trained machine learning models

B Buesser, MI Nicolae, A Rawat, M Sinn… - US Patent …, 2022 - Google Patents
One or more hardened machine learning models are secured against adversarial attacks by
adding adversarial protection to one or more previously trained machine learning models …

Robustness Assurance Quotient: Demonstrating Context Matters for AI Performance and ML Security

S Lefcourt, N Gordon, H Wong… - 2022 IEEE International …, 2022 - ieeexplore.ieee.org
We present a novel approach to developing robust AI in light of context-varying situations.
This methodology harnesses a suite of indicators to establish a Robustness Assurance …

[PDF][PDF] Compendious Comparison of Capsule Network and Convolutional Neural Network through end-to-end Digit Classification Application

M Musalea, R Joshib - International Journal of Intelligent …, 2021 - researchgate.net
Convolutional Neural Networks have proven to be the state of the art approach for doing
image processing in the field of Deep Learning. CNN has proven to be particularly …