Results 111 to 120 of about 94,262 (290)
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Integrating multimodal data and machine learning for entrepreneurship research
Abstract Research Summary Extant research in neuroscience suggests that human perception is multimodal in nature—we model the world integrating diverse data sources such as sound, images, taste, and smell. Working in a dynamic environment, entrepreneurs are expected to draw on multimodal inputs in their decision making.
Yash Raj Shrestha, Vivianna Fang He
wiley +1 more source
DLSF:A Textual Adversarial Attack Method Based on Dual-level Semantic Filtering [PDF]
In the field of commercial applications,deep learning-based text models play a crucial role but are also susceptible to adversarial samples,such as the incorporation of confusing vocabulary into reviews leading to erroneous model responses.A strong ...
XIONG Xi, DING Guangzheng, WANG Juan, ZHANG Shuai
doaj +1 more source
Adversarial Attack and Defense in Breast Cancer Deep Learning Systems. [PDF]
Li Y, Liu S.
europepmc +1 more source
Abstract Research Summary Firm technological research has the potential to spawn multiple applications. Despite recognizing such potential, past literature disagrees on the process through which firms discover and grow new applications out of their past technological research.
Xirong (Subrina) Shen
wiley +1 more source
Image classification adversarial attack with improved resizing transformation and ensemble models. [PDF]
Li C, Zhang H, Yang B, Wang J.
europepmc +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Perturbing BEAMs: EEG adversarial attack to deep learning models for epilepsy diagnosing. [PDF]
Yu J, Qiu K, Wang P, Su C, Fan Y, Cao Y.
europepmc +1 more source
Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks [PDF]
Jaehui Hwang +4 more
openalex +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source

