Results 141 to 150 of about 96,849 (322)

Artificial Intelligence in Voice Disorders: Current Landscape, Emerging Applications and Future Directions

open access: yesWorld Journal of Otorhinolaryngology - Head and Neck Surgery, EarlyView.
ABSTRACT Objective To provide a comprehensive review of the current landscape of artificial intelligence (AI) applications in voice disorder, with emphasis on emerging applications, limitations, and future directions for clinical integration. Methods Literature review.
Rachel B. Kutler, Anaïs Rameau
wiley   +1 more source

Dynamic Resource Allocation Optimisation and Security‐Resilient Control for Bandwidth‐Limited Network Control Systems With Data Conflicts

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen   +5 more
wiley   +1 more source

AT‐AER: Adversarial Training With Adaptive Example Reuse

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu   +5 more
wiley   +1 more source

Defending Neural ODE Image Classifiers from Adversarial Attacks with Tolerance Randomization

open access: green, 2021
Fabio Carrara   +3 more
openalex   +2 more sources

Stochastic Linear Bandits Robust to Adversarial Attacks [PDF]

open access: green, 2020
Ilija Bogunovic   +3 more
openalex   +1 more source

Rigid Body Adversarial Attacks

open access: yes2025 International Conference on 3D Vision (3DV)
Due to their performance and simplicity, rigid body simulators are often used in applications where the objects of interest can considered very stiff. However, no material has infinite stiffness, which means there are potentially cases where the non-zero compliance of the seemingly rigid object can cause a significant difference between its ...
Aravind Ramakrishnan   +2 more
openaire   +2 more sources

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy