Results 101 to 110 of about 1,209,773 (317)

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

A Comprehensive Risk Analysis Method for Adversarial Attacks on Biometric Authentication Systems

open access: yesIEEE Access
Recent threats to deep learning-based biometric authentication systems stem from adversarial attacks exploiting vulnerabilities in deep learning models. While existing studies extensively analyze the risk of such attacks, they primarily focus on isolated
Seong Hee Park   +4 more
doaj   +1 more source

Advancing design strategies in smart stimulus‐responsive liposomes for drug release and nanomedicine

open access: yesBMEMat, EarlyView.
Schematic illustration of stimulus‐responsive liposomes designed for controlled drug release and nanomedicine. The innermost circle represents different liposomal structures, including unilamellar, multilamellar, and multivesicular liposomes. The middle layer illustrates the responsive phospholipid components.
Yuchen Guo   +9 more
wiley   +1 more source

AI‐based localization of the epileptogenic zone using intracranial EEG

open access: yesEpilepsia Open, EarlyView.
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida   +5 more
wiley   +1 more source

Tomtit‐Raven Evolutionary Selector‐Reinforced Attention‐Driven: A High‐Performance and Computationally Efficient Cyber Threat Detection Framework for Smart Grids

open access: yesEnergy Science &Engineering, EarlyView.
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga   +3 more
wiley   +1 more source

Adversarial Privacy Preserving Graph Embedding against Inference Attack [PDF]

open access: green, 2020
Kaiyang Li   +5 more
openalex   +1 more source

Machine Learning and Artificial Intelligence Techniques for Intelligent Control and Forecasting in Energy Storage‐Based Power Systems

open access: yesEnergy Science &Engineering, EarlyView.
A new energy paradigm assisted by AI. ABSTRACT The tremendous penetration of renewable energy sources and the integration of power electronics components increase the complexity of the operation and power system control. The advancements in Artificial Intelligence and machine learning have demonstrated proficiency in processing tasks requiring ...
Balasundaram Bharaneedharan   +4 more
wiley   +1 more source

Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

open access: yes, 2018
Machine learning systems based on deep neural networks, being able to produce state-of-the-art results on various perception tasks, have gained mainstream adoption in many applications.
Liu, Yannan   +3 more
core   +1 more source

Caught in the fire: An accidental ethnography of discomfort in researching sex work

open access: yesFeminist Anthropology, EarlyView.
Abstract Drawing on fifteen years of engagement with researching Israel's sex industry, this article uses accidental ethnography to propose discomfort‐as‐method for feminist anthropology. I argue that discomfort is not a by‐product of fieldwork but a constitutive condition that disciplines researchers and shapes what can be known.
Yeela Lahav‐Raz
wiley   +1 more source

Home - About - Disclaimer - Privacy