[HTML][HTML] Privacy-preserving artificial intelligence in healthcare: Techniques and applications

N Khalid, A Qayyum, M Bilal, A Al-Fuqaha… - Computers in Biology and …, 2023 - Elsevier
There has been an increasing interest in translating artificial intelligence (AI) research into
clinically-validated applications to improve the performance, capacity, and efficacy of …

Navigating the Ethical Challenges of Artificial Intelligence in Higher Education: An Analysis of Seven Global AI Ethics Policies.

Z Slimi, BV Carballido - TEM Journal, 2023 - ceeol.com
AI use in higher education raises ethical concerns that must be addressed. Biased
algorithms pose a significant threat, especially if used in admission or grading processes, as …

[HTML][HTML] A systematic review of trustworthy artificial intelligence applications in natural disasters

AS Albahri, YL Khaleel, MA Habeeb, RD Ismael… - Computers and …, 2024 - Elsevier
Artificial intelligence (AI) holds significant promise for advancing natural disaster
management through the use of predictive models that analyze extensive datasets, identify …

Implications of Emotion Recognition Technologies: Balancing Privacy and Public Safety

LF Ortiz-Clavijo, CJ Gallego-Duque… - IEEE Technology …, 2023 - ieeexplore.ieee.org
As our world becomes increasingly interconnected, technology continues to evolve at an
unprecedented pace. One of the most intriguing advancements in recent years is the …

[HTML][HTML] Con-detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis

H Ali, MS Khan, A AlGhadhban, M Alazmi, A Alzamil… - Computers & …, 2023 - Elsevier
Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing
(NLP) tasks such as language-to-language translation, spam filtering, fake-news detection …

Membership Inference Attacks on DNNs using Adversarial Perturbations

H Ali, A Qayyum, A Al-Fuqaha, J Qadir - arXiv preprint arXiv:2307.05193, 2023 - arxiv.org
Several membership inference (MI) attacks have been proposed to audit a target DNN.
Given a set of subjects, MI attacks tell which subjects the target DNN has seen during …

Consistent Valid Physically-Realizable Adversarial Attack Against Crowd-Flow Prediction Models

H Ali, MA Butt, F Filali, A Al-Fuqaha… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Recent works have shown that deep learning (DL) models can effectively learn city-wide
crowd-flow patterns, which can be used for more effective urban planning and smart city …

Getting Smarter with Fatrix: A Facial Recognition Access Control System

AM Ayub, R Kolandaisamy… - 2023 IEEE 3rd …, 2023 - ieeexplore.ieee.org
The Library of private university has an RFID access control system. Such systems are
popular door-entry solutions that can manage access in and within buildings and …

Bio-Inspired Hyperparameter Tuning of Federated Learning for Student Activity Recognition in Online Exam Environment

R Shankarappa, N Prasad, RMR Guddeti, BR Mohan - AI, 2024 - mdpi.com
Nowadays, online examination (exam in short) platforms are becoming more popular,
demanding strong security measures for digital learning environments. This includes …

Toward Secure TinyML on a Standardized AI Architecture

MY Shabir, G Torta, A Basso, F Damiani - Device-Edge-Cloud Continuum …, 2023 - Springer
Recently, ML tasks that have been traditionally associated with high-performance CPUs and
GPUs have started to be performed also on highly constrained devices at the far edge. This …