Search results for "adversarial"

showing 10 items of 30 documents

On Attacking Future 5G Networks with Adversarial Examples : Survey

2022

The introduction of 5G technology along with the exponential growth in connected devices is expected to cause a challenge for the efficient and reliable network resource allocation. Network providers are now required to dynamically create and deploy multiple services which function under various requirements in different vertical sectors while operating on top of the same physical infrastructure. The recent progress in artificial intelligence and machine learning is theorized to be a potential answer to the arising resource allocation challenges. It is therefore expected that future generation mobile networks will heavily depend on its artificial intelligence components which may result in …

deep learning5G-tekniikkaGeneral Medicinematkaviestinverkottekoälyartificial intelligenceadversarial machine learning5G networkskoneoppiminenmatkaviestinpalvelut (telepalvelut)algoritmit5G cybersecurity knowledge basetietoturvakyberturvallisuusverkkohyökkäyksetverkkopalvelut
researchProduct

Adversarial Attack’s Impact on Machine Learning Model in Cyber-Physical Systems

2020

Deficiency of correctly implemented and robust defence leaves Internet of Things devices vulnerable to cyber threats, such as adversarial attacks. A perpetrator can utilize adversarial examples when attacking Machine Learning models used in a cloud data platform service. Adversarial examples are malicious inputs to ML-models that provide erroneous model outputs while appearing to be unmodified. This kind of attack can fool the classifier and can prevent ML-models from generalizing well and from learning high-level representation; instead, the ML-model learns superficial dataset regularity. This study focuses on investigating, detecting, and preventing adversarial attacks towards a cloud dat…

defence mechanismsComputerApplications_COMPUTERSINOTHERSYSTEMStekoälypilvipalvelutadversarial attacksmachine learningkoneoppiminenArtificial Intelligencecloud data platformälytekniikkaesineiden internettietoturvakyberturvallisuusverkkohyökkäykset
researchProduct

Strategic positioning within the normative institutional environment of Westminster

2021

International audience; L’espace du débat parlementaire à la Chambre des Communes Cette communication a pour objectif d’explorer les potentialités du cadre normatif dans l’espace des débats parlementaires à la Chambre des Communes à Westminster.Les débats parlementaires à la Chambre des Communes sont régis par des règles et des protocoles stricts. En effet, les membres de la Chambre doivent observer des règles de bonne conduite afin d’éviter tout débordement. Ce cadre institutionnel (et constitutionnel), à première vue très rigide, concerne à la fois les contraintes physiques au sein de la Chambre mais également les contraintes d’ordre discursif. Sandra Harris, en référence à la Chambre de …

game theoryWestminster systemparliamentary rulesadversarial[SHS.SCIPO] Humanities and Social Sciences/Political science[SHS.SCIPO]Humanities and Social Sciences/Political science
researchProduct

Distributed $n$-player approachability and consensus in coalitional games

2015

We study a distributed allocation process where, at each time, every player: i) proposes a new bid based on the average utilities produced up to that time, ii) adjusts such allocations based on the inputs received from its neighbors, and iii) generates and allocates new utilities. The average allocations evolve according to a doubly (over time and space) averaging algorithm. We study conditions under which the average allocations reach consensus to any point within a predefined target set even in the presence of adversarial disturbances. Motivations arise in the context of coalitional games with transferable utilities (TU) where the target set is any set of allocations that makes the grand …

game theorydistributed control consensus game theory coalitional gamesdistributed controldistributed n-player approachability distributed n-player consensus coalitional games distributed allocation process utility allocation doubly averaging algorithm adversarial disturbance transferable utilities grand coalition stabilityOptimization and Control (math.OC)consensuFOS: MathematicsSettore MAT/09 - Ricerca OperativaMathematics - Optimization and Controlcoalitional games
researchProduct

On Assessing Vulnerabilities of the 5G Networks to Adversarial Examples

2022

The use of artificial intelligence and machine learning is recognized as the key enabler for 5G mobile networks which would allow service providers to tackle the network complexity and ensure security, reliability and allocation of the necessary resources to their customers in a dynamic, robust and trustworthy way. Dependability of the future generation networks on accurate and timely performance of its artificial intelligence components means that disturbance in the functionality of these components may have negative impact on the entire network. As a result, there is an increasing concern about the vulnerability of intelligent machine learning driven frameworks to adversarial effects. In …

koneoppiminenGeneral Computer ScienceGeneral Engineeringdeep learningsyväoppiminenGeneral Materials Science5G-tekniikkaElectrical and Electronic Engineeringtekoälyartificial intelligenceadversarial machine learning5G networks
researchProduct

Semantics of Voids within Data: Ignorance-Aware Machine Learning

2021

Operating with ignorance is an important concern of geographical information science when the objective is to discover knowledge from the imperfect spatial data. Data mining (driven by knowledge discovery tools) is about processing available (observed, known, and understood) samples of data aiming to build a model (e.g., a classifier) to handle data samples that are not yet observed, known, or understood. These tools traditionally take semantically labeled samples of the available data (known facts) as an input for learning. We want to challenge the indispensability of this approach, and we suggest considering the things the other way around. What if the task would be as follows: how to buil…

luokitus (toiminta)paikkatiedotlcsh:G1-922data miningprototype selectionignorancekoneoppiminenclassificationdata semanticstiedonlouhintaadversarial learningdata voidslcsh:Geography (General)ISPRS International Journal of Geo-Information
researchProduct

Hyper-flexible Convolutional Neural Networks based on Generalized Lehmer and Power Means

2022

Convolutional Neural Network is one of the famous members of the deep learning family of neural network architectures, which is used for many purposes, including image classification. In spite of the wide adoption, such networks are known to be highly tuned to the training data (samples representing a particular problem), and they are poorly reusable to address new problems. One way to change this would be, in addition to trainable weights, to apply trainable parameters of the mathematical functions, which simulate various neural computations within such networks. In this way, we may distinguish between the narrowly focused task-specific parameters (weights) and more generic capability-spec…

neural networkCognitive NeuroscienceLehmer meansyväoppiminenneuroverkotMachine LearningflexibilitykoneoppiminenPower meanArtificial Intelligenceconvolutionadversarial robustnesspoolingNeural Networks Computeractivation functionconvolutionalgeneralization
researchProduct

IoT -based adversarial attack's effect on cloud data platform services in a smart building context

2020

IoT sensors and sensor networks are widely employed in businesses. The common problem is a remarkable number of IoT device transactions are unencrypted. Lack of correctly implemented and robust defense leaves the organization's IoT devices vulnerable to numerous cyber threats, such as adversarial and man-in-the-middle attacks or malware infections. A perpetrator can utilize adversarial examples when attacking machine learning (ML) models, such as convolutional neural networks (CNN) or deep neural networks (DNN) used, e.g., in DaaS cloud data platform service of smart buildings. DaaS cloud data platform's function in this study is to connect data from multiple IoT sensors, databases, private…

pilvipalvelutadversarial attacksartificial intelligence-based applicationsälytalotälytekniikkaesineiden internetattack vectorscloud servicetekoälytietoturvadata platformverkkohyökkäykset
researchProduct

Causality-Aware Convolutional Neural Networks for Advanced Image Classification and Generation

2023

Smart manufacturing uses emerging deep learning models, and particularly Convolutional Neural Networks (CNNs) and Generative Adversarial Networks (GANs), for different industrial diagnostics tasks, e.g., classification, detection, recognition, prediction, synthetic data generation, security, etc., on the basis of image data. In spite of being efficient for these objectives, the majority of current deep learning models lack interpretability and explainability. They can discover features hidden within input data together with their mutual co-occurrence. However, they are weak at discovering and making explicit hidden causalities between the features, which could be the reason behind the parti…

päättelyluokitus (toiminta)syväoppiminenConvolutional Neural Networkneuroverkotimage processingGenerative Adversarial NetworkkoneoppiminenkausaliteettiGeneral Earth and Planetary Sciencesvalmistustekniikkakonenäköcausal discoverycausal inferenceGeneral Environmental Science
researchProduct

Alleviating Class Imbalance Problem in Automatic Sleep Stage Classification

2022

For real-world automatic sleep-stage classification tasks, various existing deep learning-based models are biased toward the majority with a high proportion. Because of the unique sleep structure, most of the current polysomnography (PSG) datasets suffer an inherent class imbalance problem (CIP), in which the number of each sleep stage is severely unequal. In this study, we first define the class imbalance factor (CIF) to describe the level of CIP quantitatively. Afterward, we propose two balancing methods to alleviate this problem from the dataset quantity and the relationship between the class distribution and the applied model, respectively. The first one is to employ the data augmentati…

sleep-stage classificationunitutkimusdeep neural networksignaalianalyysisyväoppiminenneuroverkotdata augmentation (DA)uni (lepotila)koneoppiminenClass imbalance problem (CIP)network connectionEEGElectrical and Electronic Engineeringgenerative adversarial network (GAN)InstrumentationIEEE Transactions on Instrumentation and Measurement
researchProduct