Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    Redefining the Programmer: Human-AI Collaboration, LLMs, and Security in Modern Software Engineering

    Elyson De La Cruz*, Hanh Le, Karthik Meduri, Geeta Sandeep Nadella*, Hari Gonaygunta

    CMC-Computers, Materials & Continua, Vol.85, No.2, pp. 3569-3582, 2025, DOI:10.32604/cmc.2025.068137 - 23 September 2025

    Abstract The rapid integration of artificial intelligence (AI) into software development, driven by large language models (LLMs), is reshaping the role of programmers from traditional coders into strategic collaborators within Industry 4.0 ecosystems. This qualitative study employs a hermeneutic phenomenological approach to explore the lived experiences of Information Technology (IT) professionals as they navigate a dynamic technological landscape marked by intelligent automation, shifting professional identities, and emerging ethical concerns. Findings indicate that developers are actively adapting to AI-augmented environments by engaging in continuous upskilling, prompt engineering, interdisciplinary collaboration, and heightened ethical awareness. However, participants also voiced… More >

  • Open Access

    ARTICLE

    Adaptive Backdoor Attack against Deep Neural Networks

    Honglu He, Zhiying Zhu, Xinpeng Zhang*

    CMES-Computer Modeling in Engineering & Sciences, Vol.136, No.3, pp. 2617-2633, 2023, DOI:10.32604/cmes.2023.025923 - 09 March 2023

    Abstract In recent years, the number of parameters of deep neural networks (DNNs) has been increasing rapidly. The training of DNNs is typically computation-intensive. As a result, many users leverage cloud computing and outsource their training procedures. Outsourcing computation results in a potential risk called backdoor attack, in which a welltrained DNN would perform abnormally on inputs with a certain trigger. Backdoor attacks can also be classified as attacks that exploit fake images. However, most backdoor attacks design a uniform trigger for all images, which can be easily detected and removed. In this paper, we propose… More >

Displaying 1-10 on page 1 of 2. Per Page