Olatunji, Iyiola E. Rathee, Mandeep Funke, Thorben Khosla, Megha
Privacy and interpretability are two important ingredients for achieving trustworthy machine learning. We study the interplay of these two aspects in graph machine learning through graph reconstruction attacks. The goal of the adversary here is to reconstruct the graph structure of the training data given access to model explanations. Based on the ...
Harrou, Fouzi Taghezouit, Bilal Bouyeddou, Benamar Sun, Ying
Published in
Frontiers in Energy Research
Photovoltaic (PV) systems, as critical components of the power grid, have become increasingly reliant on standard Information Technology (IT) computing and network infrastructure for their operation and maintenance. However, this dependency exposes PV systems to heightened vulnerabilities and the risk of cyber-attacks. In recent times, the number o...
Shanker, Ravi Agrawal, Prateek Singh, Aman Bhatt, Mohammed Wasim
Published in
Nonlinear Engineering
In every network, traffic anomaly detection system is an essential field of study. In the communication system, there are various protocols and intrusions. It is still a testing area to find high precision to boost the correct distribution ratio. Many authors have worked on various algorithms such as simple classification, K-Means, Genetic Algorith...
Hoibian, Sandra Muller, Jorg Eustache, Francis Peschanski, Denis
Published in
Biologie aujourd'hui
Le suivi de la mémoire des attentats du 13 novembre, et plus généralement des attaques terroristes depuis l’an 2000, auprès de la population générale offre un matériau inédit pour comprendre l’évolution dans le temps et la construction de la mémoire collective. L’étude montre que ces attaques ont davantage marqué la population que d’autres événemen...
Selvarajan, Shitharth Manoharan, Hariprasath Iwendi, Celestine Alsowail, Rakan A. Pandiaraj, Saravanan
Published in
Frontiers in Bioengineering and Biotechnology
Purpose: In the contemporary era, a significant number of individuals encounter various health issues, including digestive system ailments, even during their advanced years. The major purpose of this study is based on certain observations that are made in internal digestive systems in order to prevent severe cause that usually occurs in elderly peo...
Shivakumar, Shweta Carricondo-Sánchez, David Athreya, Vidya Odden, Morten Dhiman, Sat Pal Vaidyanathan, Srinivas Karanth, Krithi K.
Published in
Frontiers in Conservation Science
Shared spaces in Africa and Asia accommodate both humans and big cats. This engenders rare but distinctive cases of human fatalities by lions, tigers, and leopards. Among big cats, leopards have the widest range and occur even among high densities of humans. This increased potential for encounters with humans results in attacks, exemplified most by...
Zhang, Huijie Sun, Weizhen Lu, Ling
Published in
Frontiers in Physics
Digital images are characterized by high redundancy and strong interpixel correlation. Breaking the correlation between data and improving sensitivity are crucial to protecting image information. To effectively achieve this goal, a chaotic encryption algorithm based on Josephus cycle scrambling diffusion is proposed in this paper. First, the adapti...
Leibovich-Nassi, Iris Golander, Hava Reshef, Avner
Published in
Allergy
Noor, Mah Murad, Syeda Hina
Ethereum is one of the top blockchain platforms that represents this second generation of blockchain technology. However, the security vulnerabilities associated with smart contracts pose significant risks to confidentiality, integrity, and availability of applications supported by Ethereum. While several studies have enumerated various security is...
soundararajan;, rajasoundaran
The Wireless Medium Access Control (WMAC) protocol functions by handling various data frames in order to forward them to neighbor sensor nodes. Under this circumstance, WMAC policies need secure data communication rules and intrusion detection procedures to safeguard the data from attackers. The existing secure Medium Access Control (MAC) policies ...