咨询与建议

限定检索结果

文献类型

  • 2 篇 会议

馆藏范围

  • 2 篇 电子文献
  • 0 种 纸本馆藏

日期分布

主题

  • 2 篇 measurement
  • 1 篇 iris recognition
  • 1 篇 software systems
  • 1 篇 scalability
  • 1 篇 glass box
  • 1 篇 indexes
  • 1 篇 computer securit...
  • 1 篇 computational mo...
  • 1 篇 gradient methods
  • 1 篇 software quality
  • 1 篇 software develop...
  • 1 篇 codes
  • 1 篇 machine learning
  • 1 篇 security
  • 1 篇 complexity theor...
  • 1 篇 closed box
  • 1 篇 artificial intel...
  • 1 篇 documentation
  • 1 篇 robustness

机构

  • 1 篇 communication & ...
  • 1 篇 software develop...
  • 1 篇 software develop...
  • 1 篇 communication an...

作者

  • 2 篇 doaa shawky
  • 1 篇 tasneem muhammed...
  • 1 篇 nada nabil soudi
  • 1 篇 nada tayel
  • 1 篇 tarek sharaf
  • 1 篇 rghda salah

语言

  • 2 篇 英文
检索条件"机构=Software Development Program Zewail City"
2 条 记 录,以下是1-10 订阅
排序:
Quality of AI-Generated vs. Human-Generated Code
Quality of AI-Generated vs. Human-Generated Code
收藏 引用
International Conference on Computer Theory and Applications (ICCTA)
作者: Tasneem Muhammed Eltabakh Nada Nabil Soudi Doaa Shawky Communication & Information Engineering Zewail City Giza Egypt Software Development Program Zewail City Giza Egypt
This study examines the quality differences between AI-generated and human-generated code through an evaluation of multiple software quality metrics, including maintainability, complexity, and documentation. Using a d... 详细信息
来源: 评论
Efficient Detection of Black Box Adversarial Attacks in Machine Learning Systems Using Cluster-Based and Class-Based Input Patterns
Efficient Detection of Black Box Adversarial Attacks in Mach...
收藏 引用
International Conference on Computer Theory and Applications (ICCTA)
作者: Rghda Salah Tarek Sharaf Nada Tayel Doaa Shawky Communication and Information Engineering University of Science and Technology Zewail City Giza Egypt Software Development Program University of Science and Technology Zewail City Giza Egypt
Adversarial attacks pose a significant challenge to the security and reliability of machine learning models. This paper focuses on detecting black-box adversarial attacks, where attackers operate without access to the... 详细信息
来源: 评论