This paper presents a novel approach known as Neutrosophic Fuzzy Power Management (NFPM) aimed at addressing the critical challenge of uncertain energy availability in Energy Harvesting Sensor Networks (EHWSNs). The m...
详细信息
Cyberattacks and malware detection software are in a perpetual race. Researchers have developed antimalware systems that can detect and classify malicious software automatically rather than manually analyzing malware ...
详细信息
The presence of "ill-posed samples" specifically in low-volume datasets leads to accuracy decrement in the learning procedure and the generalization of neural networks. Such samples can be caused by various ...
详细信息
This research motive is to present more realistic results through the fractional order derivatives of the Robots mathematical system (FORMS), which is used to detect the coronavirus-positive cases. This nonlinear FORM...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention...
详细信息
As the adoption of explainable AI(XAI) continues to expand, the urgency to address its privacy implications intensifies. Despite a growing corpus of research in AI privacy and explainability, there is little attention on privacy-preserving model explanations. This article presents the first thorough survey about privacy attacks on model explanations and their countermeasures. Our contribution to this field comprises a thorough analysis of research papers with a connected taxonomy that facilitates the categorization of privacy attacks and countermeasures based on the targeted explanations. This work also includes an initial investigation into the causes of privacy leaks. Finally, we discuss unresolved issues and prospective research directions uncovered in our analysis. This survey aims to be a valuable resource for the research community and offers clear insights for those new to this domain. To support ongoing research, we have established an online resource repository, which will be continuously updated with new and relevant findings.
Graph Neural Networks (GNNs) have emerged as a widely used and effective method across various domains for learning from graph data. Despite the abundance of GNN variants, many struggle with effectively propagating me...
详细信息
Detecting edges in image processing is an important process in image analysis or enhancement. Many methods detected edge information based on the differences in brightness values. Prewitt, the most widely used edge de...
详细信息
This paper solves the boundary value problem of the second-order differential equation under the neutrosophic fuzzy boundary condition. The proposed solution is approximated using the finite difference method but dene...
详细信息
Equivariant machine learning is an approach for designing deep learning models that respect the symmetries of the problem, with the aim of reducing model complexity and improving generalization. In this paper, we focu...
Portable document formats (PDFs) are widely used for document exchange due to their widespread usage and versatility. However, PDFs are highly vulnerable to malware attacks, which pose significant security risks. Exis...
详细信息
暂无评论