no code implementations • 26 Aug 2022 • Florian Huber, Artem Yushchenko, Benedikt Stratmann, Volker Steinhage
While the accuracies reached with those approaches are promising, the needed amounts of data and the ``black-box'' nature can restrict the application of Deep Learning methods.
no code implementations • 16 Feb 2021 • Jakob Greis, Artem Yushchenko, Daniel Vogel, Michael Meier, Volker Steinhage
Many IoT devices are vulnerable to attacks due to flawed security designs and lacking mechanisms for firmware updates or patches to eliminate the security vulnerabilities.