To search, Click below search items.
All Published Papers Search Service
Title
Adversarial Machine Learning: A Survey on the Influence Axis
Author
Shahad Alzahrani, Taghreed Almalki, Hatim Alsuwat, and Emad Alsuwat
Vol. 22 No. 5 pp. 193-203
Keywords
Machine Learning; Adversarial Machine Learning; Influence attack; Evasion attack; Data poisoning attack.
A Survey on Security Schemes based on Conditional Privacy-Preserving in Vehicular Ad Hoc Networks
Zeyad Ghaleb Al-Mekhlafi and Badiea Abdulkarem Mohammed
Vol. 21 No. 11 pp. 105-110
Vehicular Ad-hoc networks (VANETs), classification, authentication, conditional privacy-preserving, adversary
Security Analysis of Authentication Protocol for Mobile Devices Using Hyperelliptic Curve Cryptography
Turki Kordy, Prof.Fazal Noor and Dr.Oussama Benrhouma
Vol. 21 No. 10 pp. 91-100
Authentication, ECC, HECC, Privacy, RSA, Security
Gender and Age Estimation at Distance in Smart Cities Surveillance: A cascaded Deep Learning-Based Approach
Yahia Said
Vol. 20 No. 9 pp. 9-15
Gender estimation, Age estimation, Smart city surveillance, Deep Learning, Face detection, Generative Adversarial Network