A comprehensive survey on the security of smart grid: Challenges, mitigations, and future research opportunities
In this study, we conduct a comprehensive review of smart grid security, exploring system
architectures, attack methodologies, defense strategies, and future research opportunities …
architectures, attack methodologies, defense strategies, and future research opportunities …
Robustness of models addressing Information Disorder: A comprehensive review and benchmarking study
Abstract Machine learning and deep learning models are increasingly susceptible to
adversarial attacks, particularly in critical areas like cybersecurity and Information Disorder …
adversarial attacks, particularly in critical areas like cybersecurity and Information Disorder …
Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion
With the rise of Machine Learning as a Service (MLaaS) platforms, safeguarding the
intellectual property of deep learning models is becoming paramount. Among various …
intellectual property of deep learning models is becoming paramount. Among various …
A Trustworthy Counterfactual Explanation Method With Latent Space Smoothing
Y Li, X Cai, C Wu, X Lin, G Cao - IEEE Transactions on Image …, 2024 - ieeexplore.ieee.org
Despite the large-scale adoption of Artificial Intelligence (AI) models in healthcare, there is
an urgent need for trustworthy tools to rigorously backtrack the model decisions so that they …
an urgent need for trustworthy tools to rigorously backtrack the model decisions so that they …
Adversarially Robust Out-of-Distribution Detection Using Lyapunov-Stabilized Embeddings
Despite significant advancements in out-of-distribution (OOD) detection, existing methods
still struggle to maintain robustness against adversarial attacks, compromising their …
still struggle to maintain robustness against adversarial attacks, compromising their …
Learning-Based Verification of Stochastic Dynamical Systems with Neural Network Policies
We consider the verification of neural network policies for reach-avoid control tasks in
stochastic dynamical systems. We use a verification procedure that trains another neural …
stochastic dynamical systems. We use a verification procedure that trains another neural …
A Margin-Maximizing Fine-Grained Ensemble Method
Ensemble learning has achieved remarkable success in machine learning, but its reliance
on numerous base learners limits its application in resource-constrained environments. This …
on numerous base learners limits its application in resource-constrained environments. This …