Results 111 to 120 of about 1,209,773 (317)
Organoids and organ‐on‐a‐chips are advancing reproductive system research. In the female reproductive system, applications include cancer organoid models, placental chips, and hormone simulation models. For the male reproductive system, research focuses on drug resistance mechanisms, co‐culture platforms, and infertility studies. These refined in vitro
Hongqi Zhang +6 more
wiley +1 more source
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster +5 more
wiley +1 more source
Study of Pre-processing Defenses against Adversarial Attacks on\n State-of-the-art Speaker Recognition Systems [PDF]
Sonal Joshi +4 more
openalex +1 more source
Adaptive Perturbation for Adversarial Attack
In recent years, the security of deep learning models achieves more and more attentions with the rapid development of neural networks, which are vulnerable to adversarial examples. Almost all existing gradient-based attack methods use the sign function in the generation to meet the requirement of perturbation budget on $L_\infty$ norm. However, we find
Zheng Yuan +4 more
openaire +3 more sources
Modern AI systems can now synthesize coherent multimedia experiences, generating video and audio directly from text prompts. These unified frameworks represent a rapid shift toward controllable and synchronized content creation. From early neural architectures to transformer and diffusion paradigms, this paper contextualizes the ongoing evolution of ...
Charles Ding, Rohan Bhowmik
wiley +1 more source
A Survey of Adversarial Attacks on SAR Target Recognition: From Digital Domain to Physical Domain
Deep Neural Network (DNN)-based Synthetic Aperture Radar (SAR) image target recognition has become a prominent area of interest in SAR applications. However, deep neural network models are vulnerable to adversarial example attacks.
Hang RUAN +6 more
doaj +1 more source
Transferable Adversarial Attacks Against ASR
Given the extensive research and real-world applications of automatic speech recognition (ASR), ensuring the robustness of ASR models against minor input perturbations becomes a crucial consideration for maintaining their effectiveness in real-time scenarios.
Xiaoxue Gao +4 more
openaire +2 more sources
Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions
Despite the remarkable performance and generalization levels of deep learning models in a wide range of artificial intelligence tasks, it has been demonstrated that these models can be easily fooled by the addition of imperceptible yet malicious perturbations to natural inputs.
Vadillo, Jon +2 more
openaire +3 more sources
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien +2 more
wiley +1 more source
Abstract Managing wildfire risk requires consideration of complex and uncertain scientific evidence as well as trade‐offs between different values and goals. Conflicting perspectives on what values and goals are most important, what ought to be done and what trade‐offs are acceptable complicate those decisions.
Pele J. Cannon, Sarah Clement
wiley +1 more source

