Enhancing Adversarial Attacks via Parameter Adaptive Adversarial Attack
In recent times, the swift evolution of adversarial attacks has captured widespread attention, particularly concerning their transferability and other performance attributes. These techniques are primarily executed at the sample level, frequently overlooking the intrinsic parameters of models.
Zhibo Jin +6 more
openaire +2 more sources
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj +1 more source
Review of Research on Adversarial Attack in Three Kinds of Images [PDF]
In recent years, there have been numerous breakthroughs in deep learning, leading to the expansion of applications based on deep learning into a wide range of fields.
XU Yuhui, PAN Zhisong, XU Kun
doaj +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
Benign-salient Region Based End-to-End Adversarial Malware Generation Method [PDF]
Malware detection methods combining visualization techniques and deep learning have gained widespread attention due to their high accuracy and low cost.However,deep learning models are vulnerable to adversarial attacks,where intentional small-scale ...
YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan
doaj +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Study of Pre-processing Defenses against Adversarial Attacks on\n State-of-the-art Speaker Recognition Systems [PDF]
Sonal Joshi +4 more
openalex +1 more source
Advancing design strategies in smart stimulus‐responsive liposomes for drug release and nanomedicine
Schematic illustration of stimulus‐responsive liposomes designed for controlled drug release and nanomedicine. The innermost circle represents different liposomal structures, including unilamellar, multilamellar, and multivesicular liposomes. The middle layer illustrates the responsive phospholipid components.
Yuchen Guo +9 more
wiley +1 more source
Automating Defense Against Adversarial Attacks: Discovery of\n Vulnerabilities and Application of Multi-INT Imagery to Protect Deployed\n Models [PDF]
Josh Kalin +4 more
openalex +1 more source

