Adolph Sedem Yaw Adu

Adolph Sedem Yaw Adu

About

10
Publications
6,093
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
28
Citations
Introduction

Publications

Publications (10)
Article
Full-text available
In this paper, we present a technique for defending against adversarial attacks in neural networks. Our approach regularizer the neural network’s representation space under adversarial attacks with Centered Ranking loss to enable neural network classifiers to learn a feature representation that detects similarities between adversarial and clean sam...
Article
Full-text available
In this paper, we present a technique for defending against adversarial attacks in neural networks. Our approach reg-ularizer the neural network's representation space under adversarial attacks with Centered Ranking loss to enable a neural network classifier to learn a feature representation that detects similarities between adversarial and clean s...
Article
Full-text available
Background The degree to which Computer Science (CS) and Information Communication Technology (ICT) students are motivated to learn greatly impacts their study habits, academic achievement in school and ultimately their job prospects. In recent times, skills in programming languages have become vital in searching for employment. Objective This stu...
Chapter
Full-text available
The digitalization of education has made learning management systems (LMSs) an indispensable tool for facilitating teaching and learning in higher education institutions (HEIs). Research studies on the factors that influence LMS usage in Sub-Saharan Africa is lacking specifically in considering both technology adoption and usability as theoretical...
Chapter
Full-text available
With the ever-increasing internet penetration in Ghana, e-commerce development seems to be on the ascendency. However, users are reluctant to patronize these online sites due to the lack of trust. While literature is inundated with numerous B2B and B2C e-commerce studies, little is known about C2C e-commerce. Thus, our study contributes to the e-co...
Preprint
Full-text available
Social media and other web 2.0 tools have provided users the platform to interact and also disclose personal information not only with their friends and acquaintances, but also with relative strangers with unprecedented ease. This has enhanced the ability of people to share more about themselves, their families, and their friends through a variety...
Conference Paper
Full-text available
With the ever increasing internet penetration in Ghana, e-commerce development seems to be on the ascendency. However, users are reluctant to patronize these online sites due to the lack of trust. While literature is inundated with numerous B2B and B2C e-commerce studies, little is known about C2C e-commerce. Thus, our study contributes to the e-co...
Article
Full-text available
The government of Ghana in 2014 initiated an e-government service (e-Tax) to boost its Tax operations. With e-government, citizens and businesses are able to exploit Internet technology to improve convenience, accessibility and quality of interactions with the government. Within the government, business processes can be automated and knowledge can...

Network

Cited By