Results 231 to 240 of about 16,308 (300)
Auto encoder-based defense mechanism against popular adversarial attacks in deep learning. [PDF]
Ashraf SN, Siddiqi R, Farooq H.
europepmc +1 more source
Fast Adversarial Training against Textual Adversarial Attacks
Many adversarial defense methods have been proposed to enhance the adversarial robustness of natural language processing models. However, most of them introduce additional pre-set linguistic knowledge and assume that the synonym candidates used by attackers are accessible, which is an ideal assumption.
Yang, Yichen, Liu, Xin, He, Kun
openaire +1 more source
ABSTRACT Background and Aims The therapeutic limitations of conventional cancer treatment currently deployed are driving the development and creation of new nano‐drugs. Prostate cancer (PCa) is a prevalent clinical problem in older men with a significant global incidence, with 1.5 million cases reported in 2022.
Russell B. O. Ouma +2 more
wiley +1 more source
Abstract Background Reversible cerebral vasoconstriction syndrome (RCVS) is a potentially life‐threatening neurological condition characterized by thunderclap headaches and multifocal cerebral arterial vasoconstriction resolving within 3 months.
Kyohei Otani +3 more
wiley +1 more source
Predicting Progression From Mild Cognitive Impairment to Alzheimer's Dementia With Adversarial Attacks. [PDF]
Baytas IM.
europepmc +1 more source
Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar +4 more
wiley +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Defense against adversarial attacks: robust and efficient compressed optimized neural networks. [PDF]
Kraidia I, Ghenai A, Belhaouari SB.
europepmc +1 more source
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad +6 more
wiley +1 more source

