Results 91 to 100 of about 14,798 (256)

Self‐Driving Microscopes: AI Meets Super‐Resolution Microscopy

open access: yesSmall Methods, EarlyView.
This review examines the use of machine learning to automate super‐resolution optical microscopy, enabling the microscope to autonomously make decisions on what, when, and how to image. By eliminating the need for human intervention, this approach has the potential to enhance the versatility and accessibility of super‐resolution microscopy.
Edward N. Ward   +3 more
wiley   +1 more source

Certified Accuracy and Robustness: How different architectures stand up to adversarial attacks

open access: yesIntelligent Systems with Applications
Adversarial attacks are a concern for image classification using neural networks. Numerous methods have been created to minimize the effects of attacks, where the best defense against such attacks is through adversarial training, which has proven to be ...
Azryl Elmy Sarih   +2 more
doaj   +1 more source

Generative AI for Requirements Engineering: A Systematic Literature Review

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Introduction Requirements engineering (RE) faces challenges due to the handling of increasingly complex software systems. These challenges can be addressed using generative artificial intelligence (GenAI). Given that GenAI‐based RE has not been systematically analyzed in detail, this review examines the related research, focusing on trends ...
Haowei Cheng   +6 more
wiley   +1 more source

Towards Transferable Targeted 3D Adversarial Attack in the Physical World [PDF]

open access: green, 2023
Yao Huang   +5 more
openalex   +1 more source

Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems

open access: yesSoftware: Practice and Experience, EarlyView.
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar   +4 more
wiley   +1 more source

Adversarial Attacks on Medical Image Classification. [PDF]

open access: yesCancers (Basel), 2023
Tsai MJ, Lin PY, Lee ME.
europepmc   +1 more source

Example-based Explanations with Adversarial Attacks for Respiratory Sound Analysis [PDF]

open access: green, 2022
Yi Chang   +4 more
openalex   +1 more source

Multiscale analysis of oxidative damage in hair fibers: From AFM nanomechanics to AI‐based degradation modeling

open access: yesVIEW, EarlyView.
We investigated oxidative damage in human hair fibers using SEM and AFM‐based nanomechanical mapping, revealing progressive cuticle degradation and localized mechanical softening. cGAN was employed to model time‐dependent degradation, offering a predictive framework for assessing chemical damage in soft biomaterials.
Seungwon Choi   +8 more
wiley   +1 more source

Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain

open access: yesIEEE Access
In recent years, CNN-based object detectors have been widely adopted in autonomous systems. Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks.
Phornphawit Manasut   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy