Adversarial Patch Attacks on Vision-Based Cargo Occupancy Estimation via Differentiable 3D Simulation [PDF]
Hedna, Mohamed Rissal +1 more
openalex
RNA Modifications: Current Understandings and Future Perspectives
Types of RNA modification. We have summarized the currently common types of RNA modifications, including ac4C, m6A, m1A, m5C, m3C, m7G, and ψ, and visually characterized their features through structural formulas. The characteristic structures are marked with a background color different from the background color.
Shiyu Xiao +7 more
wiley +1 more source
Evaluating gait system vulnerabilities through PPO and GAN-generated adversarial attacks. [PDF]
Saoudi EM, Jaafari J, Jai Andaloussi S.
europepmc +1 more source
A Study of Black Box Adversarial Attacks in Computer Vision
Siddhant Bhambri +3 more
openalex +1 more source
A Blockchain‐Less Traceability System for Agriculture Using DAG, IPFS, and Serverless Deployments
ABSTRACT Ensuring transparency and integrity in agricultural data management is a critical challenge as the sector increasingly relies on advanced technologies. The primary problem is maintaining data traceability and security throughout the supply chain.
Antonio Villafranca +6 more
wiley +1 more source
Strong Target Attack on Hypergraph Neural Networks via Label Poisoning and Structure Modification. [PDF]
Huang J, Sun Q, Zhang N, Zheng M.
europepmc +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Generative Adversarial Networks for Intrusion Detection Systems: A Comprehensive Survey of Applications, Challenges, and Research Directions. [PDF]
Alauthman M +4 more
europepmc +1 more source
Abstract Research Summary Firm technological research has the potential to spawn multiple applications. Despite recognizing such potential, past literature disagrees on the process through which firms discover and grow new applications out of their past technological research.
Xirong (Subrina) Shen
wiley +1 more source
Dialectal substitution as an adversarial approach for evaluating Arabic NLP robustness. [PDF]
Alshemali B.
europepmc +1 more source

