Zobrazeno 1 - 10
of 2 834
pro vyhledávání: '"A. Jajodia"'
Publikováno v:
Journal of Mechanical Engineering and Sciences, Vol 12, Iss 4, Pp 4203-4215 (2018)
Aluminium metal matrix composites (AMCs) are widely employed in aerospace and automobile applications. Thus, they are required to operate reliably under a severe corrosive, high temperature and carbonaceous environments, without undergoing any deteri
Externí odkaz:
https://doaj.org/article/8f072e6c064f4eeeb9b046c4fdb9132b
Adversarial attacks pose significant challenges to deep neural networks (DNNs) such as Transformer models in natural language processing (NLP). This paper introduces a novel defense strategy, called GenFighter, which enhances adversarial robustness b
Externí odkaz:
http://arxiv.org/abs/2404.11538
Tabular data typically contains private and important information; thus, precautions must be taken before they are shared with others. Although several methods (e.g., differential privacy and k-anonymity) have been proposed to prevent information lea
Externí odkaz:
http://arxiv.org/abs/2208.08114
Trigger-word detection plays an important role as the entry point of user's communication with voice assistants. But supporting a particular word as a trigger-word involves huge amount of data collection, augmentation and labelling for that word. Thi
Externí odkaz:
http://arxiv.org/abs/2111.03971
Quantum Annealing is a heuristic for solving optimization problems that have seen a recent surge in usage owing to the success of D-Wave Systems. This paper aims to find a good heuristic for solving the Electric Vehicle Charger Placement (EVCP) probl
Externí odkaz:
http://arxiv.org/abs/2111.01622
Autor:
Wang, Xinda, Wang, Shu, Feng, Pengbin, Sun, Kun, Jajodia, Sushil, Benchaaboun, Sanae, Geck, Frank
Publikováno v:
2021 IEEE Military Communications Conference (MILCOM), 2021, pp. 595-600
With the increasing usage of open-source software (OSS) components, vulnerabilities embedded within them are propagated to a huge number of underlying applications. In practice, the timely application of security patches in downstream software is cha
Externí odkaz:
http://arxiv.org/abs/2108.03358
Autor:
Sonthalia, Nikhil, Tewari, Awanish, Patil, Vikram, Jajodia, Surabhi, Goenka, Usha, Roy, Akash, Tiwary, Indrajeet, Goenka, Mahesh Kumar
Publikováno v:
In VideoGIE June 2024 9(6):298-301
Publikováno v:
In Diagnostic and Interventional Imaging February 2024 105(2):47-56
To this date, CAPTCHAs have served as the first line of defense preventing unauthorized access by (malicious) bots to web-based services, while at the same time maintaining a trouble-free experience for human visitors. However, recent work in the lit
Externí odkaz:
http://arxiv.org/abs/2010.16204
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.