Results 91 to 100 of about 96,849 (322)
Schematic representation of artificial intelligence approaches in enzyme catalysis, integrating bibliometric analysis, emerging research trends, and machine learning tools for enzyme design, prediction, and industrial biocatalytic applications. Abstract This study systematically explores the applications of artificial intelligence (AI) in enzyme ...
Misael Bessa Sales +6 more
wiley +1 more source
Attention, Please! Adversarial Defense via Attention Rectification and Preservation
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping +6 more
core
Artificial intelligence for adaptive neuromodulation in drug‐resistant epilepsy
Abstract Drug‐resistant epilepsy (DRE) affects nearly one third of people with epilepsy and is associated with substantial cognitive, psychiatric, and mortality burdens. For patients who are not candidates for resection or laser interstitial thermal therapy, neuromodulation therapies such as vagus nerve stimulation, deep brain stimulation, and ...
Amir Hossein Daraie +10 more
wiley +1 more source
Causality adversarial attack generation algorithm for intelligent unmanned communication system
A causality adversarial attack generation algorithm was proposed in response to the causality issue of gradient-based adversarial attack generation algorithms in practical communication system.The sequential input-output features and temporal memory ...
Shuwen YU, Wei XU, Jiacheng YAO
doaj +2 more sources
Diverse Generative Perturbations on Attention Space for Transferable Adversarial Attacks [PDF]
Woo Jae Kim +2 more
openalex +1 more source
AI‐based localization of the epileptogenic zone using intracranial EEG
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida +5 more
wiley +1 more source
An adversarial attack method based on pixel location characteristics
Deep learning techniques have been widely used in various fields. However, they face significant security challenges due to the existence of adversarial examples.
Zhao Qin +4 more
doaj +1 more source
Deviations in Representations Induced by Adversarial Attacks [PDF]
Daniel Steinberg, Paul Munro
openalex +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang +3 more
doaj +1 more source

