Results 91 to 100 of about 1,209,773 (317)
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors
Adaptive adversarial attacks, where adversaries tailor their strategies with full knowledge of defense mechanisms, pose significant challenges to the robustness of adversarial detectors. In this paper, we introduce RADAR (Robust Adversarial Detection via
Raz Lapid, Almog Dubin, Moshe Sipper
doaj +1 more source
A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked infrared images. The encoder and decoder incorporate preprocessing steps, attention mechanisms, and activation functions suitable for infrared images.
Yu Bai +4 more
wiley +1 more source
Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects
Although neural networks are near achieving performance similar to humans in many tasks, they are susceptible to adversarial attacks in the form of a small, intentionally designed perturbation, which could lead to misclassifications.
Bader Rasheed +4 more
doaj +1 more source
Cardiovascular diseases are leading death causes; electrocardiogram (ECG) analysis is slow, motivating machine learning and deep learning. This study compares deep convolutional generative adversarial network, conditional GAN, and Wasserstein GAN with gradient penalty (WGAN‐GP) for synthetic ECG spectrograms; Fréchet Inception Distance (FID) and ...
Giovanny Barbosa‐Casanova +3 more
wiley +1 more source
Study on Adversarial Sample Attacks on Deep Learning Based Fingerprinting Indoor Localization [PDF]
This study investigated adversarial attacks on Deep Learning(DL) based Wi-Fi fingerprint indoor positioning systems, which have significantly improved indoor localization performance by effectively extracting deep features from Received Signal Strength ...
ZHANG Xuejun, XI Ayou, JIA Xiaohong, ZHANG Bin, LI Mei, DU Xiaogang, HUANG Haiyan
doaj +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas +4 more
wiley +1 more source
Artificial intelligence (AI) has made remarkable progress in recent years in remote sensing applications, including environmental monitoring, crisis management, city planning, and agriculture.
Sumaiya Tasneem, Kazi Aminul Islam
doaj +1 more source
Sparse Adversarial Attack in Multi-agent Reinforcement Learning [PDF]
Yizheng Hu, Zhihua Zhang
openalex +1 more source

