Secure and trustworthy artificial intelligence-extended reality (AI-XR) for metaverses
Metaverse is expected to emerge as a new paradigm for the next-generation Internet,
providing fully immersive and personalized experiences to socialize, work, and play in self …
providing fully immersive and personalized experiences to socialize, work, and play in self …
Building robust machine learning systems: Current progress, research challenges, and opportunities
Machine learning, in particular deep learning, is being used in almost all the aspects of life
to facilitate humans, specifically in mobile and Internet of Things (IoT)-based applications …
to facilitate humans, specifically in mobile and Internet of Things (IoT)-based applications …
[HTML][HTML] Towards secure private and trustworthy human-centric embedded machine learning: An emotion-aware facial recognition case study
The use of artificial intelligence (AI) at the edge is transforming every aspect of the lives of
human beings from scheduling daily activities to personalized shopping recommendations …
human beings from scheduling daily activities to personalized shopping recommendations …
All your fake detector are belong to us: evaluating adversarial robustness of fake-news detectors under black-box settings
With the hyperconnectivity and ubiquity of the Internet, the fake news problem now presents
a greater threat than ever before. One promising solution for countering this threat is to …
a greater threat than ever before. One promising solution for countering this threat is to …
[HTML][HTML] Tamp-X: Attacking explainable natural language classifiers through tampered activations
While the technique of Deep Neural Networks (DNNs) has been instrumental in achieving
state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works …
state-of-the-art results for various Natural Language Processing (NLP) tasks, recent works …
Stain: Stealthy avenues of attacks on horizontally collaborated convolutional neural network inference and their mitigation
AA Adeyemo, JJ Sanderson, TA Odetola… - IEEE …, 2023 - ieeexplore.ieee.org
With significant potential improvement in device-to-device (D2D) communication due to
improved wireless link capacity (eg, 5G and NextG systems), a collaboration of multiple …
improved wireless link capacity (eg, 5G and NextG systems), a collaboration of multiple …
Fadec: A fast decision-based attack for adversarial machine learning
Due to the excessive use of cloud-based machine learning (ML) services, the smart cyber-
physical systems (CPS) are increasingly becoming vulnerable to black-box attacks on their …
physical systems (CPS) are increasingly becoming vulnerable to black-box attacks on their …
Overview of security for smart cyber-physical systems
The tremendous growth of interconnectivity and dependencies of physical and cyber
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …
domains in cyber-physical systems (CPS) makes them vulnerable to several security threats …
[HTML][HTML] Con-detect: Detecting adversarially perturbed natural language inputs to deep classifiers through holistic analysis
Deep Learning (DL) algorithms have shown wonders in many Natural Language Processing
(NLP) tasks such as language-to-language translation, spam filtering, fake-news detection …
(NLP) tasks such as language-to-language translation, spam filtering, fake-news detection …
Exploiting vulnerabilities in deep neural networks: Adversarial and fault-injection attacks
F Khalid, MA Hanif, M Shafique - arXiv preprint arXiv:2105.03251, 2021 - arxiv.org
From tiny pacemaker chips to aircraft collision avoidance systems, the state-of-the-art Cyber-
Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs) …
Physical Systems (CPS) have increasingly started to rely on Deep Neural Networks (DNNs) …