Results 231 to 240 of about 16,308 (300)

Fast Adversarial Training against Textual Adversarial Attacks

open access: yes
Many adversarial defense methods have been proposed to enhance the adversarial robustness of natural language processing models. However, most of them introduce additional pre-set linguistic knowledge and assume that the synonym candidates used by attackers are accessible, which is an ideal assumption.
Yang, Yichen, Liu, Xin, He, Kun
openaire   +1 more source

Artificial Intelligence and Prostate–Breast Cancer Biology: Recent Advances in Treatments and Perspectives — A Comprehensive Review

open access: yesHealth Science Reports, Volume 9, Issue 3, March 2026.
ABSTRACT Background and Aims The therapeutic limitations of conventional cancer treatment currently deployed are driving the development and creation of new nano‐drugs. Prostate cancer (PCa) is a prevalent clinical problem in older men with a significant global incidence, with 1.5 million cases reported in 2022.
Russell B. O. Ouma   +2 more
wiley   +1 more source

Robustness to Adversarial Attacks.

open access: green
Mohsen H. Alhazmi (22756263)
openalex   +1 more source

Reversible cerebral vasoconstriction syndrome in psychiatric settings: Context‐dependent diagnostic bias and consultation‐liaison psychiatry practice

open access: yesPsychiatry and Clinical Neurosciences Reports, Volume 5, Issue 1, March 2026.
Abstract Background Reversible cerebral vasoconstriction syndrome (RCVS) is a potentially life‐threatening neurological condition characterized by thunderclap headaches and multifocal cerebral arterial vasoconstriction resolving within 3 months.
Kyohei Otani   +3 more
wiley   +1 more source

Fail‐Controlled Classifiers: A Swiss‐Army Knife Toward Trustworthy Systems

open access: yesSoftware: Practice and Experience, Volume 56, Issue 3, Page 239-259, March 2026.
ABSTRACT Background Modern critical systems often require to take decisions and classify data and scenarios autonomously without having detrimental effects on people, infrastructures or the environment, ensuring desired dependability attributes. Researchers typically strive to craft classifiers with perfect accuracy, which should be always correct and ...
Fahad Ahmed Khokhar   +4 more
wiley   +1 more source

Mission Aware Cyber‐Physical Security

open access: yesSystems Engineering, Volume 29, Issue 2, Page 354-367, March 2026.
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis   +3 more
wiley   +1 more source

Federated Learning and 5G/6G‐Based Internet of Medical Things (IoMT): Applications, Key Enabling Technologies, Open Issues and Future Research Directions

open access: yesWIREs Data Mining and Knowledge Discovery, Volume 16, Issue 1, March 2026.
This review examines the integration of federated learning (FL) in the Internet of Medical Things (IoMT), enhanced by 5G/6G technologies, to improve healthcare systems with decentralized data processing, enhanced privacy, reduced latency, and efficient resource utilization, while addressing emerging challenges and future research directions.
Abdul Ahad   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy