Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses
Metaverse is expected to emerge as a new paradigm for the next-generation Internet,
providing fully immersive and personalized experiences to socialize, work, and play in self …
providing fully immersive and personalized experiences to socialize, work, and play in self …
[HTML][HTML] Resilience and resilient systems of artificial intelligence: taxonomy, models and methods
Artificial intelligence systems are increasingly being used in industrial applications, security
and military contexts, disaster response complexes, policing and justice practices, finance …
and military contexts, disaster response complexes, policing and justice practices, finance …
Hardware and software optimizations for accelerating deep neural networks: Survey of current trends, challenges, and the road ahead
Currently, Machine Learning (ML) is becoming ubiquitous in everyday life. Deep Learning
(DL) is already present in many applications ranging from computer vision for medicine to …
(DL) is already present in many applications ranging from computer vision for medicine to …
Qeba: Query-efficient boundary-based blackbox attack
Abstract Machine learning (ML), especially deep neural networks (DNNs) have been widely
used in various applications, including several safety-critical ones (eg autonomous driving) …
used in various applications, including several safety-critical ones (eg autonomous driving) …
Robust machine learning systems: Challenges, current trends, perspectives, and the road ahead
Currently, machine learning (ML) techniques are at the heart of smart cyber-physical
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
systems (CPSs) and Internet-of-Things (loT). This article discusses various challenges and …
Stateful detection of black-box adversarial attacks
The problem of adversarial examples, evasion attacks on machine learning classifiers, has
proven extremely difficult to solve. This is true even in the black-box threat model, as is the …
proven extremely difficult to solve. This is true even in the black-box threat model, as is the …
Deep learning for edge computing: Current trends, cross-layer optimizations, and open research challenges
In the Machine Learning era, Deep Neural Networks (DNNs) have taken the spotlight, due to
their unmatchable performance in several applications, such as image processing, computer …
their unmatchable performance in several applications, such as image processing, computer …
[HTML][HTML] Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of
human beings from scheduling daily activities to personalized shopping recommendations …
human beings from scheduling daily activities to personalized shopping recommendations …
Towards query-efficient adversarial attacks against automatic speech recognition systems
Adversarial attacks, which attract explosive rese-arch attention in recent years, have
achieved fantastic success in fooling neural networks, especially for image-classification …
achieved fantastic success in fooling neural networks, especially for image-classification …
Towards energy-efficient and secure edge AI: A cross-layer framework ICCAD special session paper
The security and privacy concerns along with the amount of data that is required to be
processed on regular basis has pushed processing to the edge of the computing systems …
processed on regular basis has pushed processing to the edge of the computing systems …