Results 91 to 100 of about 16,308 (300)

Adaptive Perturbation for Adversarial Attack

open access: yesIEEE Transactions on Pattern Analysis and Machine Intelligence
In recent years, the security of deep learning models achieves more and more attentions with the rapid development of neural networks, which are vulnerable to adversarial examples. Almost all existing gradient-based attack methods use the sign function in the generation to meet the requirement of perturbation budget on $L_\infty$ norm. However, we find
Zheng Yuan   +4 more
openaire   +3 more sources

Artificial Intelligence in Ophthalmology: Current Status, Challenges, and Future Perspectives

open access: yesHealth Care Science, EarlyView.
Current research of artificial intelligence (AI) in ophthalmology. ABSTRACT Artificial intelligence (AI) is revolutionizing ophthalmology by providing innovative solutions for disease screening, diagnosis, personalized treatment, and the delivery of global healthcare services.
She Chongyang, Tao Yong
wiley   +1 more source

A Survey of Adversarial Attacks on SAR Target Recognition: From Digital Domain to Physical Domain

open access: yesLeida xuebao
Deep Neural Network (DNN)-based Synthetic Aperture Radar (SAR) image target recognition has become a prominent area of interest in SAR applications. However, deep neural network models are vulnerable to adversarial example attacks.
Hang RUAN   +6 more
doaj   +1 more source

Transferable Adversarial Attacks Against ASR

open access: yesIEEE Signal Processing Letters
Given the extensive research and real-world applications of automatic speech recognition (ASR), ensuring the robustness of ASR models against minor input perturbations becomes a crucial consideration for maintaining their effectiveness in real-time scenarios.
Xiaoxue Gao   +4 more
openaire   +2 more sources

Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions

open access: yes, 2020
Despite the remarkable performance and generalization levels of deep learning models in a wide range of artificial intelligence tasks, it has been demonstrated that these models can be easily fooled by the addition of imperceptible yet malicious perturbations to natural inputs.
Vadillo, Jon   +2 more
openaire   +3 more sources

Organoids and organ‐on‐a‐chip models for investigating the pathophysiology of the human reproductive system

open access: yesInterdisciplinary Medicine, EarlyView.
Organoids and organ‐on‐a‐chips are advancing reproductive system research. In the female reproductive system, applications include cancer organoid models, placental chips, and hormone simulation models. For the male reproductive system, research focuses on drug resistance mechanisms, co‐culture platforms, and infertility studies. These refined in vitro
Hongqi Zhang   +6 more
wiley   +1 more source

Defeating Adversarial Attacks Againt Adversarial attacks in Network Security

open access: green, 2022
Ehsan Nowroozi   +5 more
openalex   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Home - About - Disclaimer - Privacy