Stealth cyber-attacks against power grids, water systems and other critical infrastructure often go undetected until it is too late. Led by Dr. Irfan Khan, researchers from the Clean and Resilient ...
ABSTRACT: Accurate measurement of time-varying systematic risk exposures is essential for robust financial risk management. Conventional asset pricing models, such as the Fama-French three-factor ...
Imagine joining a video call with your CEO, only to find out later the CEO participant was actually an AI-generated fake. Welcome to the new digital battlefield. Adversarial AI and deepfakes have ...
ABSTRACT: The rapid proliferation of the Internet of Things (IoT) and Industrial IoT (IIoT) has revolutionized industries through enhanced connectivity and automation. However, this expansion has ...
Abstract: A novelty detection task involves identifying whether a data point is an outlier, given a training dataset that primarily captures the distribution of inliers. The novel class is usually ...
Abstract: Gears play an indispensable role in the transmission systems of advanced industrial equipment. Timely detection of anomalies in gear components is crucial for ensuring operational efficiency ...
This is a code repository for a paper with title "Mitigating Adversarial Attacks in Federated Learning Based Network Traffic Classification Applications using Secure Hierarchical Remote Attestation ...
In this blogpost, ESET researchers provide an analysis of Spellbinder, a lateral movement tool for performing adversary-in-the-middle attacks, used by the China-aligned threat actor that we have named ...
When using notebooks/adversarial_patch/attack_adversarial_patch_pytorch_yolo.ipynb, training a patch also impacts the object detection model resulting in lowered ...