Open Access. Powered by Scholars. Published by Universities.®
- Discipline
-
- Business (3)
- Business Administration, Management, and Operations (2)
- Computer Sciences (2)
- Physical Sciences and Mathematics (2)
- Artificial Intelligence and Robotics (1)
-
- Business Intelligence (1)
- Computer Engineering (1)
- Computer and Systems Architecture (1)
- Databases and Information Systems (1)
- Digital Communications and Networking (1)
- Engineering (1)
- Law (1)
- Library and Information Science (1)
- Marketing (1)
- Military, War, and Peace (1)
- Other Computer Engineering (1)
- Social and Behavioral Sciences (1)
- Systems Science (1)
- Publication
- Publication Type
Articles 1 - 5 of 5
Full-Text Articles in Entire DC Network
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Machine Learning Security For Tactical Operations, Dr. Denaria Fields, Shakiya A. Friend, Andrew Hermansen, Dr. Tugba Erpek, Dr. Yalin E. Sagduyu
Military Cyber Affairs
Deep learning finds rich applications in the tactical domain by learning from diverse data sources and performing difficult tasks to support mission-critical applications. However, deep learning models are susceptible to various attacks and exploits. In this paper, we first discuss application areas of deep learning in the tactical domain. Next, we present adversarial machine learning as an emerging attack vector and discuss the impact of adversarial attacks on the deep learning performance. Finally, we discuss potential defense methods that can be applied against these attacks.
Artificial Intelligence In Retailing, Ibrahim Kircova, Munise Hayrun Saglam, Sirin Gizem Kose
Artificial Intelligence In Retailing, Ibrahim Kircova, Munise Hayrun Saglam, Sirin Gizem Kose
University of South Florida (USF) M3 Publishing
Advances in Artificial Intelligence and Machine Learning technologies have brought a completely new level of data processing that provides deeper business insights. Purchasing advice, dynamic pricing, personal content and advice have become widely used in the retail industry thanks to artificial intelligence. Almost real-time results can be achieved by expanding the scope of data obtained from existing customers and algorithms that mimic human-like behavior. In addition, interactions with machines are more widely accepted than before, allowing consumers to accept innovations faster and thus increase brand loyalty. On the other hand, the success of artificial intelligence, which will change the future …
Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian
Designing Targeted Mobile Advertising Campaigns, Kimia Keshanian
USF Tampa Graduate Theses and Dissertations
With the proliferation of smart, handheld devices, there has been a multifold increase in the ability of firms to target and engage with customers through mobile advertising. Therefore, not surprisingly, mobile advertising campaigns have become an integral aspect of firms’ brand building activities, such as improving the awareness and overall visibility of firms' brands. In addition, retailers are increasingly using mobile advertising for targeted promotional activities that increase in-store visits and eventual sales conversions. However, in recent years, mobile or in general online advertising campaigns have been facing one major challenge and one major threat that can negatively impact the …
Essays On Cloud Computing Analytics, Vivek Kumar Singh
Essays On Cloud Computing Analytics, Vivek Kumar Singh
USF Tampa Graduate Theses and Dissertations
This dissertation research focuses on two key aspects of cloud computing research – pricing and security using data-driven techniques such as deep learning and econometrics. The first dissertation essay (Chapter 1) examines the adoption of spot market in cloud computing and builds IT investment estimation models for organizations adopting cloud spot market. The second dissertation essay (Chapter 2 and 3) studies proactive threat detection and prediction in cloud computing. The final dissertation essay (Chapter 4) develops a secured cloud files system which protects organizations using cloud computing in accidental data leaks.
Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers
Evaluating Machine Learning Classifiers For Defensive Cyber Operations, Michael D. Rich, Robert F. Mills, Thomas E. Dube, Steven K. Rogers
Military Cyber Affairs
Today’s defensive cyber sensors are dominated by signature-based analytical methods that require continuous maintenance and lack the ability to detect unknown threats. Anomaly detection offers the ability to detect unknown threats, but despite over 15 years of active research, the operationalization of anomaly detection and machine learning for Defensive Cyber Operations (DCO) is lagging. This article provides an introduction to machine learning concepts with a focus on the unique challenges to using machine learning for DCO. Traditional machine learning evaluation methods are challenged in favor of a value-focused evaluation method that incorporates evaluator-specific weights for classifier and sensitivity threshold selection …