Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences

Old Dominion University

Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment

Book Gallery

Articles 1 - 2 of 2

Full-Text Articles in Physical Sciences and Mathematics

Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz Jan 2021

Using Torchattacks To Improve The Robustness Of Models With Adversarial Training, William S. Matos Díaz

Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment

Adversarial training has proven to be one of the most successful ways to defend models against adversarial examples. This process consists of training a model with an adversarial example to improve the robustness of the model. In this experiment, Torchattacks, a Pytorch library made for importing adversarial examples more easily, was used to determine which attack was the strongest. Later on, the strongest attack was used to train the model and make it more robust against adversarial examples. The datasets used to perform the experiments were MNIST and CIFAR-10. Both datasets were put to the test using PGD, FGSM, and …


Measurement Study Of Energy Impact On Blockchain Technologies: Cryptocurrency Mining, Qaylin Holliman Jan 2021

Measurement Study Of Energy Impact On Blockchain Technologies: Cryptocurrency Mining, Qaylin Holliman

Cybersecurity: Deep Learning Driven Cybersecurity Research in a Multidisciplinary Environment

Blockchain technology facilitates the flow of information and the speed of information through a faster and more decentralized network. It has its advantages as compared to more centralized networks and legacy networks. With the evolution of mainstream technology, blockchains is predicted to be more effective and sufficient to consumers and commercial companies. In this paper, blockchains will be scaled to cryptocurrency mining, where cryptocurrencies utilize blockchain technology to record transactions and orders. Mining will also be examined through energy consumption, the algorithms behind some cryptocurrencies, their sustainability issue, and resolutions to combat high energy consumption. While the pace of energy …