Results 91 to 100 of about 85,609 (269)

Artificial Intelligence in Ophthalmology: Current Status, Challenges, and Future Perspectives

open access: yesHealth Care Science, EarlyView.
Current research of artificial intelligence (AI) in ophthalmology. ABSTRACT Artificial intelligence (AI) is revolutionizing ophthalmology by providing innovative solutions for disease screening, diagnosis, personalized treatment, and the delivery of global healthcare services.
She Chongyang, Tao Yong
wiley   +1 more source

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

open access: yes, 2019
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping   +6 more
core  

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

SURVEY OF ADVERSARIAL ATTACKS AND DEFENSE AGAINST ADVERSARIAL ATTACKS

open access: yesDarpan International Research Analysis
In recent years, the fields of Artificial Intelligence (AI) and Deep learning (DL) techniques along with Neural Networks (NNs) have shown great progress and scope for future research. Along with all the developments comes the threats and security vulnerabilities to Neural Networks and AI models. A few fabricated inputs/samples can lead to deviations in
Akshat Jain   +3 more
openaire   +1 more source

Clinical Feasibility of Deep Learning Contrast Synthesis From MR Fingerprinting in Knee Osteoarthritis

open access: yesJournal of Magnetic Resonance Imaging, EarlyView.
ABSTRACT Background Magnetic Resonance Fingerprinting (MRF) enables rapid quantitative parameter mapping from which synthetic clinical contrast images can be derived using deep learning (DL). Purpose This study evaluates the reliability and interchangeability of MRF‐derived synthetic knee MRI relative to conventional MRI in patients with osteoarthritis.
Mika T. Nevalainen   +9 more
wiley   +1 more source

Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

open access: yes, 2018
Machine learning systems based on deep neural networks, being able to produce state-of-the-art results on various perception tasks, have gained mainstream adoption in many applications.
Liu, Yannan   +3 more
core   +1 more source

Preparing for Tomorrow's Teamwork: Insights From eSports on How Human Expertise Shapes Training Needs for AI‐Integrated Work

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster   +5 more
wiley   +1 more source

A Survey of Adversarial Attacks on SAR Target Recognition: From Digital Domain to Physical Domain

open access: yesLeida xuebao
Deep Neural Network (DNN)-based Synthetic Aperture Radar (SAR) image target recognition has become a prominent area of interest in SAR applications. However, deep neural network models are vulnerable to adversarial example attacks.
Hang RUAN   +6 more
doaj   +1 more source

Interdiction Models and Heuristics for Graph Propagation

open access: yesNetworks, EarlyView.
ABSTRACT Given a graph G=(V,E)$$ G=\left(V,E\right) $$ and a set S⊂V$$ S\subset V $$ of activated/infected nodes, we consider the problem of determining the set of c$$ c $$ nodes that minimizes the network propagation on the subgraph that results from the removal of those c$$ c $$ nodes. To measure network propagation, we assume that a node i$$ i $$ is
Agostinho Agra, José Maria Samuco
wiley   +1 more source

Navigating the Rapids: How Non‐Governmental Organization Managers Develop Strategic Adaptation to Repressive Political Environments

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy