Results 21 to 30 of about 14,798 (256)
A Q‐Learning Algorithm to Solve the Two‐Player Zero‐Sum Game Problem for Nonlinear Systems
A Q‐learning algorithm to solve the two‐player zero‐sum game problem for nonlinear systems. ABSTRACT This paper deals with the two‐player zero‐sum game problem, which is a bounded L2$$ {L}_2 $$‐gain robust control problem. Finding an analytical solution to the complex Hamilton‐Jacobi‐Issacs (HJI) equation is a challenging task.
Afreen Islam +2 more
wiley +1 more source
A Survey on Adversarial Attacks for Malware Analysis
Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats.
Kshitiz Aryal +4 more
doaj +1 more source
This review discusses cellulose‐based hydrogels technology, analyzes their application progress in physiological signal monitoring, and explores the effects of pretreatment, crosslinking, and molding methods on gel performance, to provide valuable insights into the efficient utilization of plant fibers and the environmentally friendly development of ...
Zhiming Wang +8 more
wiley +1 more source
Robust ConvLSTM Model With Deep Reinforcement Learning for Stealth Attack Detection in Smart Grids
The advent of modern electricity distribution systems, comprising digital communication technologies and principles, has triggered a new era of smart grids, in which advanced metering infrastructure plays a crucial role in functions, such as digital ...
Ahmad N. Alkuwari +3 more
doaj +1 more source
A Robust Method to Protect Text Classification Models against Adversarial Attacks
Text classification is one of the main tasks in natural language processing. Recently, adversarial attacks have shown a substantial negative impact on neural network-based text classification models. There are few defenses to strengthen model predictions
BALA MALLIKARJUNARAO GARLAPATI +2 more
doaj +1 more source
The paper proposes that the root cause of aging is the loss of anatomical goal‐directedness after development. Using evolutionary neural cellular automata simulations, the authors show that after the organism has reached its developmental homeostatic setpoint (the adult morphology), the absence of target state to pursue leads to a drifting anatomical ...
Léo Pio‐Lopez +2 more
wiley +1 more source
Breaking and Healing: GAN-Based Adversarial Attacks and Post-Adversarial Recovery for 5G IDSs
Generative adversarial networks (GANs) have advanced rapidly in data augmentation and generation, and researchers have been exploring their applications in other areas, including adversarial attack generation.
Yasmeen Alslman +2 more
doaj +1 more source
Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems
Adversarial attacks, e.g., adversarial perturbations of the input and adversarial samples, pose significant challenges to machine learning and deep learning techniques, including interactive recommendation systems.
Siyu Wang +5 more
doaj +1 more source
Artificial Intelligence for Bone: Theory, Methods, and Applications
Advances in artificial intelligence (AI) offer the potential to improve bone research. The current review explores the contributions of AI to pathological study, biomarker discovery, drug design, and clinical diagnosis and prognosis of bone diseases. We envision that AI‐driven methodologies will enable identifying novel targets for drugs discovery. The
Dongfeng Yuan +3 more
wiley +1 more source
Multi-Stage Adversarial Defense for Online DDoS Attack Detection System in IoT
Machine learning-based Distributed Denial of Service (DDoS) attack detection systems have proven effective in detecting and preventing DDoD attacks in Internet of Things (IoT) systems.
Yonas Kibret Beshah +2 more
doaj +1 more source

