Results 141 to 150 of about 96,849 (322)
ABSTRACT Objective To provide a comprehensive review of the current landscape of artificial intelligence (AI) applications in voice disorder, with emphasis on emerging applications, limitations, and future directions for clinical integration. Methods Literature review.
Rachel B. Kutler, Anaïs Rameau
wiley +1 more source
Improving the adversarial transferability with relational graphs ensemble adversarial attack. [PDF]
Pi J, Luo C, Xia F, Jiang N, Wu H, Wu Z.
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model. [PDF]
Fu Z, Cui X.
europepmc +1 more source
AT‐AER: Adversarial Training With Adaptive Example Reuse
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu +5 more
wiley +1 more source
SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research. [PDF]
Gao W, Liu Y, Zeng Y, Liu Q, Li Q.
europepmc +1 more source
Defending Neural ODE Image Classifiers from Adversarial Attacks with Tolerance Randomization
Fabio Carrara +3 more
openalex +2 more sources
Stochastic Linear Bandits Robust to Adversarial Attacks [PDF]
Ilija Bogunovic +3 more
openalex +1 more source
Rigid Body Adversarial Attacks
Due to their performance and simplicity, rigid body simulators are often used in applications where the objects of interest can considered very stiff. However, no material has infinite stiffness, which means there are potentially cases where the non-zero compliance of the seemingly rigid object can cause a significant difference between its ...
Aravind Ramakrishnan +2 more
openaire +2 more sources
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source

