Results 31 to 40 of about 14,798 (256)
Deep Learning‐Assisted Coherent Raman Scattering Microscopy
The analytical capabilities of coherent Raman scattering microscopy are augmented through deep learning integration. This synergistic paradigm improves fundamental performance via denoising, deconvolution, and hyperspectral unmixing. Concurrently, it enhances downstream image analysis including subcellular localization, virtual staining, and clinical ...
Jianlin Liu +4 more
wiley +1 more source
The double-edged sword of AI: Ethical Adversarial Attacks to counter artificial intelligence for crime [PDF]
Michał Choraś, Michał Woźniak
openalex +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
The robustness of Deep Neural Networks (DNNs) against adversarial attacks is an important topic in the area of deep learning. To fully investigate the robustness of DNNs, this study examines four frequently used white box adversarial attack techniques ...
Mafizur Rahman +3 more
doaj +1 more source
A Robust Adversarial Example Attack Based on Video Augmentation
Despite the success of learning-based systems, recent studies have highlighted video adversarial examples as a ubiquitous threat to state-of-the-art video classification systems.
Mingyong Yin +3 more
doaj +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked infrared images. The encoder and decoder incorporate preprocessing steps, attention mechanisms, and activation functions suitable for infrared images.
Yu Bai +4 more
wiley +1 more source
Modern artificial intelligence (AI) technologies are being used in a variety of fields, from science to everyday life. However, the widespread use of AI-based systems has highlighted a problem with their vulnerability to adversarial attacks.
A. A. Vorobeva +4 more
doaj +1 more source
A Survey on Efficient Methods for Adversarial Robustness
Deep learning has revolutionized computer vision with phenomenal success and widespread applications. Despite impressive results in complex problems, neural networks are susceptible to adversarial attacks: small and imperceptible changes in input space ...
Awais Muhammad, Sung-Ho Bae
doaj +1 more source
Black-box Adversarial Attacks on Commercial Speech Platforms with Minimal Information [PDF]
Baolin Zheng +8 more
openalex +1 more source

