60   Artículos

« Anterior     Página: 1 de 4     Siguiente »

 
en línea
Shilin Qiu, Qihe Liu, Shijie Zhou and Chunjiang Wu    
In recent years, artificial intelligence technologies have been widely used in computer vision, natural language processing, automatic driving, and other fields. However, artificial intelligence systems are vulnerable to adversarial attacks, which limit ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Luitze Perk, Leo van Rijn, Kimberley Koudstaal and Jan Fordeyn    
A rational method for the design of sand dike/dune systems at sheltered sites is presented, focussing on the cross-shore dimensions of the sand dike in relation to the local wave climate, tidal regime and available sandy materials. The example case is th... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Tatjana Stevanovic,Ljilja Antic,Aleksandar Savic     Pág. 283 - 297
The purpose of this paper is to investigate the specific characteristics of performance measurement on the example of the Ministry of Defense and the Serbian Armed Forces. The calculation of financial and non-financial performance measures of the Ministr... ver más
Revista: Facta Universitatis. Series: Economics and Organization    Formato: Electrónico

 
en línea
Yuwen Fu, E. Xia, Duan Huang and Yumei Jing    
Machine learning has been applied in continuous-variable quantum key distribution (CVQKD) systems to address the growing threat of quantum hacking attacks. However, the use of machine learning algorithms for detecting these attacks has uncovered a vulner... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Aneta Wysokinska-Senkus, Justyna Górna, Magdalena Kazmierczak, Pawel Mielcarek and Piotr Senkus    
Context: Food safety is essential for every human. It determines public health, nutrition, elimination of hunger, and the promotion of sustainable agriculture. It is crucial for sustainable production, consumption, and international food trade. Ensuring ... ver más
Revista: Agriculture    Formato: Electrónico

 
en línea
Weizhen Xu, Chenyi Zhang, Fangzhen Zhao and Liangda Fang    
Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negative e... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Mengjing Gao, Tian Yan, Quancheng Li, Wenxing Fu and Jin Zhang    
As defense technology develops, it is essential to study the pursuit?evasion (PE) game problem in hypersonic vehicles, especially in the situation where a head-on scenario is created. Under a head-on situation, the hypersonic vehicle?s speed advantage is... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Yuhang Zhang and Ming Ni    
With the increasing deployment of advanced sensing and measurement devices, the modern distribution system is evolved into a cyber-physical power distribution system (CPPDS). Due to the extensive application of information and communication technology, C... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dejian Guan, Wentao Zhao and Xiao Liu    
Recent studies show that deep neural networks (DNNs)-based object recognition algorithms overly rely on object textures rather than global object shapes, and DNNs are also vulnerable to human-less perceptible adversarial perturbations. Based on these two... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Junfeng Zhou, Lin Zhao, Jianhua Cheng, Shuo Wang and Yipeng Wang    
This paper studies the orbital pursuit-evasion-defense problem with the continuous low thrust propulsion. A control strategy for the pursuer is proposed based on the fuzzy comprehensive evaluation and the differential game. First, the system is described... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yang Sun, Yun Li, Wei Xiong, Zhonghua Yao, Krishna Moniz and Ahmed Zahir    
Using Pareto optimization in Multi-Objective Reinforcement Learning (MORL) leads to better learning results for network defense games. This is particularly useful for network security agents, who must often balance several goals when choosing what action... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jinze Du, Chengtai Gao and Tao Feng    
The Data Distribution Service (DDS) for real-time systems is an industrial Internet communication protocol. Due to its distributed high reliability and the ability to transmit device data communication in real-time, it has been widely used in industry, m... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Lei Chen, Zhihao Wang, Ru Huo and Tao Huang    
As an essential piece of infrastructure supporting cyberspace security technology verification, network weapons and equipment testing, attack defense confrontation drills, and network risk assessment, Cyber Range is exceptionally vulnerable to distribute... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Hong Zeng, Yuanhao Zhao, Tianjian Wang and Jundong Zhang    
False Data Injection Attacks (FDIA) on ship Direct Current (DC) microgrids may result in the priority trip of a large load, a black-out, and serious accidents of ship collisions when maneuvering in the port. The key of the prevention of FDIA is the detec... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Li Fan, Wei Li and Xiaohui Cui    
Many deepfake-image forensic detectors have been proposed and improved due to the development of synthetic techniques. However, recent studies show that most of these detectors are not immune to adversarial example attacks. Therefore, understanding the i... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Xiaole Ji, Xinze Li, Yaqian He and Xiaolong Liu    
County-level economic statistics estimation using remotely sensed data, such as nighttime light data, has various advantages over traditional methods. However, uncertainties in remotely sensed data, such as the saturation problem of the Defense Meteorolo... ver más
Revista: ISPRS International Journal of Geo-Information    Formato: Electrónico

 
en línea
Zhixin Li, Desheng Wen, Zongxi Song, Tuochi Jiang, Weikang Zhang, Gang Liu and Xin Wei    
Space target surveillance is a significant part of space defense, and is also important for maintaining national security. Imaging of the space targets is the direct method used to realize space target recognition. However, for long-range space targets, ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Xiaobo Tan, Yingjie Xu, Tong Wu and Bohan Li    
Cross-site scripting vulnerability (XSS) is one of the most frequently exploited and harmful vulnerabilities among web vulnerabilities. In recent years, many researchers have used different machine learning methods to detect network attacks, but these me... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yong Zhu, Qingyi Wu, Shengnan Tang, Boo Cheong Khoo and Zhengxi Chang    
As the modern industry rapidly advances toward digitalization, networking, and intelligence, intelligent fault diagnosis technology has become a necessary measure to ensure the safe and stable operation of mechanical equipment and effectively avoid major... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Riccardo Lazzarini, Huaglory Tianfield and Vassilis Charissis    
The number of Internet of Things (IoT) devices has increased considerably in the past few years, resulting in a large growth of cyber attacks on IoT infrastructure. As part of a defense in depth approach to cybersecurity, intrusion detection systems (IDS... ver más
Revista: AI    Formato: Electrónico

« Anterior     Página: 1 de 4     Siguiente »