RS
R. Stenhuis
info
Please Note
<p>This page displays the records of the person named above and is not linked to a unique person identifier. This record may need to be merged to a profile.</p>
2 records found
1
Leveraging Feature Extraction to Detect Adversarial Examples
Let's Meet in the Middle
Previous research has explored the detection of adversarial examples with dimensional reduction and Out-of-Distribution (OOD) recognition. However, these approaches are not effective against white-box adversarial attacks. Moreover, recent OOD methods that utilize hidden units hin
...
While the Routing Protocol for Low Power and Lossy Networks (RPL) is built to support the constraints of low-powered devices, it struggles to meet the standards in security. Generally, low-powered devices are challenged with limited cryptography, tough key management, and interop
...