Zobrazeno 1 - 10
of 21
pro vyhledávání: '"AGYEMANG, PAUL A."'
Autor:
Banahene, Joel Cox Menka, Ofosu, Isaac Williams, Odai, Bernard Tawiah, Lutterodt, Herman Erick, Agyemang, Paul Ayiku, Ellis, Williams Otoo
Publikováno v:
In Heliyon 30 October 2024 10(20)
Publikováno v:
Applied Sciences, Vol 14, Iss 19, p 8691 (2024)
Insulator and defect detection is a critical technology for the automated inspection of transmission and distribution lines within smart grids. However, the development of a lightweight, real-time detection platform suitable for deployment on drones
Externí odkaz:
https://doaj.org/article/346c9c0eb3d9488bb794502804791861
Publikováno v:
Applied Sciences, Vol 13, Iss 22, p 12520 (2023)
Software-Defined Networking (SDN) enhances network control but faces Distributed Denial of Service (DDoS) attacks due to centralized control and flow-table constraints in network devices. To overcome this limitation, we introduce a multi-path routing
Externí odkaz:
https://doaj.org/article/36c12b6f2fad4bcb9ddc064dda3bad37
Publikováno v:
IEEE Access, Vol 10, Pp 2880-2894 (2022)
Machine learning algorithms are susceptible to cyberattacks, posing security problems in computer vision, speech recognition, and recommendation systems. So far, researchers have made great strides in adopting adversarial training as a defensive stra
Externí odkaz:
https://doaj.org/article/96e921df7aeb45648e51b525151d3296
Publikováno v:
International Journal of Machine Learning and Cybernetics.
Publikováno v:
International Journal of Multimedia Information Retrieval. 12
Publikováno v:
Multimedia Tools and Applications. 81:14573-14588
Publikováno v:
Neural Processing Letters. 54:637-655
Machine learning classifiers are vulnerable to adversarial perturbation, and their presence raises security concerns, especially in recommendation systems. While attacks and defense mechanisms in recommendation systems have received significant atten
Publikováno v:
Applied Intelligence. 52:3499-3510
Machine learning classifiers are susceptible to adversarial perturbations, and their existence raises security concerns with a focus on recommendation systems. While there is a substantial effort to investigate attacks and defensive techniques in rec
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.