Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comp...
Data poisoning attacks, where adversaries manipulate training data to degrade model performance, are an emerging threat as machine learning becomes widely deployed in sensitive applications. This paper provides a comprehensive overview of data poisoning including attack techniques, adversary incentives, impacts on security and reliability, detection methods, defenses, and key research gaps. We examine label flipping, instance injection, backdoors, and other attack categories that enable malicious outcomes ranging from IP theft to accidents in autonomous systems. Promising detection approaches include statistical tests, robust learning, and forensics. However, significant challenges remain in translating academic defenses like adversarial training and sanitization into practical tools ready for operational use. With safety and trustworthiness at stake, more research on benchmarking evaluations, adaptive attacks, fundamental tradeoffs, and real-world deployment of defenses is urgently needed. Understanding vulnerabilities and developing resilient machine learning pipelines will only grow in importance as data integrity is fundamental to developing safe artificial intelligence.
This article discusses the problems of using groundwater resources of the Karakalpak artesian basin. The task of drawing up a geological and mathematical model of the operational resources of groundwater in the Karaka...
详细信息
In this paper are presented the description of the developed and implemented system for tests control and the analysis of the results received from the testing of students. The database and the developed forms are rev...
详细信息
This paper presents the threshold value determination model, its implementation algorithm, and the characteristics of the threshold value depending on the probability of false signal detection, developed for the purpo...
This paper presents the threshold value determination model, its implementation algorithm, and the characteristics of the threshold value depending on the probability of false signal detection, developed for the purpose of researching the method of energy determination in spectrum sensing in cognitive radio networks. Also, the main methods of single-band spectrum sensing in cognitive radio networks were initially studied in the article, and the main spectrum detection algorithms were comparatively analyzed.
This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, we...
This paper analyzes of the hardware and software tools for implementing a cognitive radio network. In particular, software-configurable radio modules, which are considered the main element of the cognitive network, were studied according to their main characteristics, among which the widely used ones were comparatively analyzed. As a result of the analysis, the HackRF One device was selected as the most preferred option for cognitive network research, and its working principles, structure, and characteristics were revealed in detail. It also provides information about the GNU Radio software environment and its capabilities, which are used to operate the HackRF One device.
This article describes the design and implementation of an Embedded Interactive Timing System. Such systems are used in the therapy of children who have learning problems. The matching of different beats can help the ...
详细信息
—The mathematical model for many problems is arising in different industries of natural science, basically formulated using differential, integral and integro-differential equations. The investigation of these equati...
详细信息
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing...
The Virtual Reality (VR) experiences are great for an engaging presentation creating wide public awareness of cultural heritage, especially if the experience is built on a web-based technology. One of the still posing challenges is that once an application has been developed, for example for a virtual museum or a virtual tour, it usually remains fixed to an embedded in the application model. Adding new functionalities or interaction paradigms needs additional development and new deployment. In this paper, we propose a framework, which achieves the decoupling of an experience from the used models and interaction paradigms through scene and input templates and configuration files. This allows an easy way for generation of a variety of experiences even by people with no or limited programming skills.
Attackers are perpetually modifying their tactics to avoid detection and frequently leverage legitimate credentials with trusted tools already deployed in a network environment, making it difficult for organizations t...
详细信息
In the last years, Virtual Reality (VR) has been established itself as a highly promising media technology for reconstruction and presentation of cultural heritage sites to a wide audience. Virtual Reality enables not...
In the last years, Virtual Reality (VR) has been established itself as a highly promising media technology for reconstruction and presentation of cultural heritage sites to a wide audience. Virtual Reality enables not only an exploration of a single artefact but of many virtual objects spatially and temporally arranged into a single scene. The users enter an artificially created space and get a feeling of being a part of it. They can perceive and interact with the objects in the virtual environment in natural way. In this paper we propose a conceptual model of the VR module for the “Virtual Plaza for Immersive Representation of Bulgarian Cultural Heritage Sites”. It contains an analysis of the possible input data and the developed workflows to help experts from the cultural heritage domain to implement various scenarios for presentation of single artefacts and complete scene par of cultural heritage site using the benefits of Virtual Reality as visualization medium.
暂无评论