Buscar
Mostrando ítems 11-13 de 13
Social IoT Approach to Cyber Defense of a Deep-Learning-Based Recognition System in front of Media Clones Generated by Model Inversion Attack
(IEEE Transactions on Systems, Man, and Cybernetics: Systems, 2023)
Model inversion attack (MIA) is a cyber threat with an increasing alert even for deep-learning-based recognition systems (DLRSs). By targeting a DLRS under a scenario of attacker access to the model structure and parameters, ...
Customer churn prediction for web browsers
(Expert Systems with Applications, 2022)
In the competitive web browser market, identifying potential churners is critical to decreasing the loss of existing customers. Churn prediction based on customer behaviors plays a vital role in customer retention strategies. ...
DisastDrone: A Disaster Aware Consumer Internet of Drone Things System in Ultra-Low Latent 6G Network
(IEEE Transactions on Consumer Electronics, 2023)
Internet of Things application in disaster responses and management is a predominant research domain. The introduction of the consumer drones, flying ad-hoc networks, low latency 5G, and beyond 5G produce significant ...