Detecting Conventional and Adversarial Attacks Using Deep Learning Techniques: A Systematic Review

T Ali, A Eleyan, T Bejaoui - 2023 International Symposium on …, 2023 - ieeexplore.ieee.org
Significant progress has been made towards developing Deep Learning (DL) in Artificial
Intelligence (AI) models that can make independent decisions. However, this progress has …

Stain: Stealthy avenues of attacks on horizontally collaborated convolutional neural network inference and their mitigation

AA Adeyemo, JJ Sanderson, TA Odetola… - IEEE …, 2023 - ieeexplore.ieee.org
With significant potential improvement in device-to-device (D2D) communication due to
improved wireless link capacity (eg, 5G and NextG systems), a collaboration of multiple …

Optimization Method to Predict Optimal Noise Reduction Parameters for the Non-Local Means Algorithm Based on the Scintillator Thickness in Radiography

BK Cha, KH Lee, Y Lee, K Kim - Sensors, 2023 - mdpi.com
The resulting image obtained from an X-ray imaging system depends significantly on the
characteristics of the detector. In particular, when an X-ray image is acquired by thinning the …

Systematic literature review: Evaluating effects of adversarial attacks and attack generation methods

S Akram, SU Bazai, MI Ghafoor… - … on Energy, Power …, 2023 - ieeexplore.ieee.org
Advancement in Artificial Intelligence (AI) aims to train the Machine Learning (ML) Models in
such a way that they would be able to take decisions spontaneously, however on the other …

Activity Recognition in IoT

MM Sandhu, S Khalifa, M Portmann… - Self-Powered Internet of …, 2023 - Springer
Due to the advancements in technology and microelectromechanical systems, there is an
exceptional development in the capabilities of sensors and smart devices. Nowadays …

Towards Securing Edge Intelligence for Inference in Horizontal Collaborative Environments

AA Adeyemo - 2023 - search.proquest.com
With the growing demand for real-time intelligence driven by device-to-device (D2D)
communication, deploying Deep Learning (DL) applications at the network edge becomes …

Investigate the Suitability of Adversarial Perturbation in Preserving Privacy in the Context of Photos

S Madhisetty, V Patel - Proceedings of the Future Technologies …, 2023 - Springer
Post-publication of Photos and Videos privacy settings may not be as its original intention for
publication was. Sometimes inadvertently sensitive information may be disclosed to others …