In this paper, we design and present a novel model called SePEnTra to en...
Cyber-phishing attacks recently became more precise, targeted, and tailo...
The rapid advances in fitness wearable devices are redefining privacy ar...
Wearable fitness devices are widely used to track an individual's health...
Device-to-device (D2D) communication is one of the most recent advanceme...
Access control models have been developed to control authorized access t...
Previous robustness approaches for deep learning models such as data
aug...
The diversity and quantity of the data warehousing, gathering data from
...
Machine learning models have demonstrated vulnerability to adversarial
a...
Machine learning models have demonstrated vulnerability to adversarial
a...
Anomaly detection aims to recognize samples with anomalous and unusual
p...
Transfer learning, that transfer the learned knowledge of pre-trained Te...
The vulnerability of deep neural networks to adversarial attacks has bee...
Transfer learning accelerates the development of new models (Student Mod...