Zobrazeno 1 - 10
of 3 835
pro vyhledávání: '"Taylor, T. A."'
Autor:
Nguyen, Quang, Vu, Truong, Nguyen, Trong-Tung, Wen, Yuxin, Robinette, Preston K, Johnson, Taylor T, Goldstein, Tom, Tran, Anh, Nguyen, Khoi
Image editing technologies are tools used to transform, adjust, remove, or otherwise alter images. Recent research has significantly improved the capabilities of image editing tools, enabling the creation of photorealistic and semantically informed f
Externí odkaz:
http://arxiv.org/abs/2412.03809
In recent years, the rise of machine learning (ML) in cybersecurity has brought new challenges, including the increasing threat of backdoor poisoning attacks on ML malware classifiers. For instance, adversaries could inject malicious samples into pub
Externí odkaz:
http://arxiv.org/abs/2412.03441
Publikováno v:
EPTCS 411, 2024, pp. 201-218
Behavior Trees (BTs) are high-level controllers that are useful in a variety of planning tasks and are gaining traction in robotic mission planning. As they gain popularity in safety-critical domains, it is important to formalize their syntax and sem
Externí odkaz:
http://arxiv.org/abs/2411.14165
Publikováno v:
EPTCS 411, 2024, pp. 56-72
Behavior Trees (BTs) are high level controllers that have found use in a wide range of robotics tasks. As they grow in popularity and usage, it is crucial to ensure that the appropriate tools and methods are available for ensuring they work as intend
Externí odkaz:
http://arxiv.org/abs/2411.14162
Federated Learning (FL) offers a promising solution to the privacy concerns associated with centralized Machine Learning (ML) by enabling decentralized, collaborative learning. However, FL is vulnerable to various security threats, including poisonin
Externí odkaz:
http://arxiv.org/abs/2411.03231
Federated Learning (FL) shows promise in preserving privacy and enabling collaborative learning. However, most current solutions focus on private data collected from a single domain. A significant challenge arises when client data comes from diverse
Externí odkaz:
http://arxiv.org/abs/2410.22622
In fragile watermarking, a sensitive watermark is embedded in an object in a manner such that the watermark breaks upon tampering. This fragile process can be used to ensure the integrity and source of watermarked objects. While fragile watermarking
Externí odkaz:
http://arxiv.org/abs/2409.19442
This paper presents the syntax and semantics of a novel type of hybrid automaton (HA) with partial differential equation (PDE) dynamic, partial differential hybrid automata (PDHA). In PDHA, we add a spatial domain $X$ and harness a mathematic concept
Externí odkaz:
http://arxiv.org/abs/2404.11900
Autor:
Robinette, Preston K., Lopez, Diego Manzanas, Serbinowska, Serena, Leach, Kevin, Johnson, Taylor T.
Malware, or software designed with harmful intent, is an ever-evolving threat that can have drastic effects on both individuals and institutions. Neural network malware classification systems are key tools for combating these threats but are vulnerab
Externí odkaz:
http://arxiv.org/abs/2404.05703
Recent advancements in federated learning (FL) have greatly facilitated the development of decentralized collaborative applications, particularly in the domain of Artificial Intelligence of Things (AIoT). However, a critical aspect missing from the c
Externí odkaz:
http://arxiv.org/abs/2401.07448