Results 91 to 100 of about 96,849 (322)

Artificial intelligence in enzyme catalysis: Emerging trends and applications in biocatalyst engineering

open access: yesThe Canadian Journal of Chemical Engineering, EarlyView.
Schematic representation of artificial intelligence approaches in enzyme catalysis, integrating bibliometric analysis, emerging research trends, and machine learning tools for enzyme design, prediction, and industrial biocatalytic applications. Abstract This study systematically explores the applications of artificial intelligence (AI) in enzyme ...
Misael Bessa Sales   +6 more
wiley   +1 more source

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

open access: yes, 2019
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping   +6 more
core  

Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy

open access: yesEpilepsia, EarlyView.
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie   +10 more
wiley   +1 more source

Causality adversarial attack generation algorithm for intelligent unmanned communication system

open access: yesTongxin xuebao
A causality adversarial attack generation algorithm was proposed in response to the causality issue of gradient-based adversarial attack generation algorithms in practical communication system.The sequential input-output features and temporal memory ...
Shuwen YU, Wei XU, Jiacheng YAO
doaj   +2 more sources

AI‐based localization of the epileptogenic zone using intracranial EEG

open access: yesEpilepsia Open, EarlyView.
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida   +5 more
wiley   +1 more source

An adversarial attack method based on pixel location characteristics

open access: yesJournal of Intelligent Systems
Deep learning techniques have been widely used in various fields. However, they face significant security challenges due to the existence of adversarial examples.
Zhao Qin   +4 more
doaj   +1 more source

A Review of Overcurrent Protection in Smart Grids Under Cyber‐Physical Threats With a Cyber‐Physical Evaluation Framework

open access: yesEnergy Science &Engineering, EarlyView.
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali   +6 more
wiley   +1 more source

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

open access: yesFuture Internet, 2019
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy