CISPA researcher Sarath Sivaprasad, together with Hui-Po Wang and Mario Fritz from CISPA and other colleagues from HIPS, has ...
The civilian GPS signals are vulnerable to spoofing attacks in UAV system. A new on-board algorithm named MSSTP-OAD enables low-cost drones to detect counterfeit GPS positions in real time using only ...
With seemingly everyone jumping on the AI bandwagon, businesses are burning through budgets, often with little to show for it. Success in AI demands far more than just paying for data labeling—which I ...
Abstract: Industrial anomaly detection is hindered by data inefficiency and dependence on large-scale training sets. We introduce CLIP-FSQAE, a novel framework for few-shot anomaly detection that ...
Creative Commons (CC): This is a Creative Commons license. Attribution (BY): Credit must be given to the creator. The natural gas pipeline network has a complex topology with variable flow directions, ...
Utilities are using AI to modernize the aging grid with tools to manage growing energy demands. Predictive maintenance and genAI assistants are predicting grid risk and reducing repair time. This ...
1 Department of Computer Science and Engineering, Oakland University, Rochester, MI, USA. 2 Department of Computer Science, Kettering University, Flint, MI, USA. Intelligent vehicles require strong ...
In the fast-changing digital world, cybersecurity threats create substantial risks for organizations globally. Proactive defense is vital to counter these challenges. Real-time vulnerability detection ...
┌─────────────────┐ ┌─────────────────┐ ┌─────────────────┐ │ Data Sources │ │ Stream Process │ │ Anomaly Engine ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results