Latest issues
- 2025, Issue 4
- 2025, Issue 3
- 2025, Issue Спецвыпуск
- 2025, Issue 2
Articles from section "Machine learning and knowledge control systems"
Adversarial attacks against a machine learning based intrusion detection system
- Year: 2023
- Issue: 4
- 1
- 203
- Pages: 156-190
Using machine learning algorithms and Honeypot system to detect adversarial attacks on intrusion detection systems
- Year: 2023
- Issue: 4
- 0
- 175
- Pages: 145-155
Cluster analysis of a collective of algorithms for multicore neural network automates and robots on chip
- Year: 2023
- Issue: 4
- 0
- 169
- Pages: 133-144
Creation and prospects of development of software for finding snow cover maxima from databases of meteorological archives
- Year: 2023
- Issue: 3
- 0
- 168
- Pages: 177-185
Development of a trainable neural network for analysis of linguistic data
- Year: 2023
- Issue: 3
- 0
- 179
- Pages: 170-176
Multi-label classification of labels of system logs of computer networks. Formalization of the task
- Year: 2023
- Issue: 3
- 1
- 185
- Pages: 154-169
STUDY OF MACHINE LEARNING METHODS TO ENSURE INFORMATION SECURITY IN RETAIL TRADING OPERATIONS
- Year: 2022
- Issue: 3
- 0
- 178
- Pages: 155-166
Artificial neural networks in the navigation safety system of autonomous unmanned vessels
- Year: 2023
- Issue: 2
- 0
- 191
- Pages: 191-201
PROTECTION AGAINST ATTACKS ON MACHINE LEARNING SYSTEMS ON THE EXAMPLE OF EVADIATION ATTACKS IN MEDICAL IMAGE ANALYSIS
- Year: 2022
- Issue: 2
- 1
- 204
- Pages: 148-159
COMPARISON OF THE EFFECTIVENESS OF ANOMALY DETECTION BY MACHINE LEARNING ALGORITHMS WITHOUT A TEACHER
- Year: 2022
- Issue: 2
- 0
- 220
- Pages: 135-147
INFLUENCING FACTORS INFORMATION USAGE FOR SPLITTING DATA SAMPLES IN MACHINE LEARNING METHODS TO ASSESS IS STATE
- Year: 2022
- Issue: 2
- 0
- 208
- Pages: 125-134
Methodological and technological foundations for countering cognitive threats in generative multimodal content
- Year: 2025
- Issue: 4
- 16
- 357
- Pages: 138-162
A protection method for the global model of the federated learning systems based on a trust model
- Year: 2024
- Issue: 4
- 4
- 333
- Pages: 94-108
Authorship identification and verification using machine and deep learning methods
- Year: 2024
- Issue: 2
- 0
- 333
- Pages: 178-193
Detection of artificially synthesized audio files using graph neural networks
- Year: 2024
- Issue: 2
- 2
- 357
- Pages: 169-177
Automatic synthesis of 3D gas turbine blades shapes using machine learning
- Year: 2024
- Issue: 2
- 1
- 340
- Pages: 152-168
Intelligent mechanisms for extracting features of file modification in dynamic virus analysis
- Year: 2024
- Issue: 1
- 0
- 451
- Pages: 153-167
Protection of the machine learning models from the training data membership inference
- Year: 2024
- Issue: 1
- 1
- 432
- Pages: 142-152
Protection against adversarial attacks on image recognition systems using an autoencoder
- Year: 2023
- Issue: 1
- 3
- 426
- Pages: 119-127
The hybrid method for evasion attacks detection in the machine learning systems
- Year: 2023
- Issue: 1
- 0
- 413
- Pages: 104-110
Application of genetic algorithm for selection of neyral network hyperparameters
- Year: 2025
- Issue: 2
- 5
- 516
- Pages: 112-120
Query processing in Data Lake Management System based on a universal data model
- Year: 2025
- Issue: 2
- 0
- 462
- Pages: 96-111
Research of adversarial attacks on classical machine learning models in the context of network threat detection
- Year: 2025
- Issue: 3
- 19
- 612
- Pages: 147-164
From exploitation to protection: analysis of methods for defending against attacks on LLMS
- Year: 2025
- Issue: 3
- 18
- 605
- Pages: 110-120
Detecting adversarial samples in intrusion detection systems using machine learning models
- Year: 2025
- Issue: 1
- 9
- 550
- Pages: 59-68
From exploitation to protection: a deep dive into adversarial attacks on LLMS
- Year: 2025
- Issue: 1
- 9
- 571
- Pages: 43-58
Protecting neural network models from privacy violation threats in federated learning using optimization methods
- Year: 2025
- Issue: 1
- 3
- 557
- Pages: 21-29