- Home
- Search Results
- Page 1 of 1
Search for: All records
-
Total Resources2
- Resource Type
-
0000100001000000
- More
- Availability
-
20
- Author / Contributor
- Filter by Author / Creator
-
-
Akimov, D. (1)
-
An, P. (1)
-
Awe, C. (1)
-
Barbeau, P.S. (1)
-
Becker, B. (1)
-
Belov, V. (1)
-
Bernardi, I. (1)
-
Blackston, M.A. (1)
-
Blokland, L. (1)
-
Bolozdynya, A. (1)
-
Cabrera-Palmer, B. (1)
-
Chen, N. (1)
-
Chernyak, D. (1)
-
Conley, E. (1)
-
Daughhetee, J. (1)
-
Detwiler, J.A. (1)
-
Durand, M.R. (1)
-
Efremenko, Y. (1)
-
Elliott, S.R. (1)
-
Fabris, L. (1)
-
- Filter by Editor
-
-
& Spizer, S. M. (0)
-
& . Spizer, S. (0)
-
& Ahn, J. (0)
-
& Bateiha, S. (0)
-
& Bosch, N. (0)
-
& Brennan K. (0)
-
& Brennan, K. (0)
-
& Chen, B. (0)
-
& Chen, Bodong (0)
-
& Drown, S. (0)
-
& Ferretti, F. (0)
-
& Higgins, A. (0)
-
& J. Peters (0)
-
& Kali, Y. (0)
-
& Ruiz-Arias, P.M. (0)
-
& S. Spitzer (0)
-
& Sahin. I. (0)
-
& Spitzer, S. (0)
-
& Spitzer, S.M. (0)
-
(submitted - in Review for IEEE ICASSP-2024) (0)
-
-
Have feedback or suggestions for a way to improve these results?
!
Note: When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher.
Some full text articles may not yet be available without a charge during the embargo (administrative interval).
What is a DOI Number?
Some links on this page may take you to non-federal websites. Their policies may differ from this site.
-
Emerging Artificial Intelligence (AI) applications are bringing with them both the potential for significant societal benefit and harm. Additionally, vulnerabilities within AI source code can make them susceptible to attacks ranging from stealing private data to stealing trained model parameters. Recently, with the adoption of open-source software (OSS) practices, the AI development community has introduced the potential to worsen the number of vulnerabilities present in emerging AI applications, building new applications on top of previous applications, naturally inheriting any vulnerabilities. With the AI OSS community growing rapidly to a scale that requires automated means of analysis for vulnerability management, we compare three categories of unsupervised graph embedding methods capable of generating repository embeddings that can be used to rank existing applications based on their functional similarity for AI developers. The resulting embeddings can be used to suggest alternatives to AI developers for potentially insecure AI repositories.more » « less
-
Akimov, D.; An, P.; Awe, C.; Barbeau, P.S.; Becker, B.; Belov, V.; Bernardi, I.; Blackston, M.A.; Blokland, L.; Bolozdynya, A.; et al (, Journal of Instrumentation)Abstract We report on the preparation of and calibration measurements with a 83 mKr source for the CENNS-10 liquid argon detector. 83 mKr atoms generated in the decay of a 83 Rb source were introduced into the detector via injection into the Ar circulation loop. Scintillation light arising from the 9.4 keV and 32.1 keV conversion electrons in the decay of 83 mKr in the detector volume were then observed. This calibration source allows the characterization of the low-energy response of the CENNS-10 detector and is applicable to other low-energy-threshold detectors. The energy resolution of the detector was measured to be 9% at the total 83 mKr decay energy of 41.5 keV. We performed an analysis to separately calibrate the detector using the two conversion electrons at 9.4 keV and 32.1 keV.more » « less
An official website of the United States government

Full Text Available