Results 41 to 50 of about 14,798 (256)

Synthetic Electrocardiogram Spectrogram Generation Using Generative Adversarial Network‐Based Models: A Comparative Study

open access: yesAdvanced Intelligent Systems, EarlyView.
Cardiovascular diseases are leading death causes; electrocardiogram (ECG) analysis is slow, motivating machine learning and deep learning. This study compares deep convolutional generative adversarial network, conditional GAN, and Wasserstein GAN with gradient penalty (WGAN‐GP) for synthetic ECG spectrograms; Fréchet Inception Distance (FID) and ...
Giovanny Barbosa‐Casanova   +3 more
wiley   +1 more source

Fortify the Guardian, Not the Treasure: Resilient Adversarial Detectors

open access: yesMathematics
Adaptive adversarial attacks, where adversaries tailor their strategies with full knowledge of defense mechanisms, pose significant challenges to the robustness of adversarial detectors. In this paper, we introduce RADAR (Robust Adversarial Detection via
Raz Lapid, Almog Dubin, Moshe Sipper
doaj   +1 more source

Understanding Youth Assaults of Police Officers in Australia: A Power Threat Meaning Framework Analysis

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas   +4 more
wiley   +1 more source

Study on Adversarial Sample Attacks on Deep Learning Based Fingerprinting Indoor Localization [PDF]

open access: yesJisuanji gongcheng
This study investigated adversarial attacks on Deep Learning(DL) based Wi-Fi fingerprint indoor positioning systems, which have significantly improved indoor localization performance by effectively extracting deep features from Received Signal Strength ...
ZHANG Xuejun, XI Ayou, JIA Xiaohong, ZHANG Bin, LI Mei, DU Xiaogang, HUANG Haiyan
doaj   +1 more source

Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects

open access: yesInternational Transactions on Electrical Energy Systems, 2022
Although neural networks are near achieving performance similar to humans in many tasks, they are susceptible to adversarial attacks in the form of a small, intentionally designed perturbation, which could lead to misclassifications.
Bader Rasheed   +4 more
doaj   +1 more source

Advancing design strategies in smart stimulus‐responsive liposomes for drug release and nanomedicine

open access: yesBMEMat, EarlyView.
Schematic illustration of stimulus‐responsive liposomes designed for controlled drug release and nanomedicine. The innermost circle represents different liposomal structures, including unilamellar, multilamellar, and multivesicular liposomes. The middle layer illustrates the responsive phospholipid components.
Yuchen Guo   +9 more
wiley   +1 more source

A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

open access: yesFuture Internet
With the rapid advancements and notable achievements across various application domains, Machine Learning (ML) has become a vital element within the Internet of Things (IoT) ecosystem.
Hassan Khazane   +3 more
doaj   +1 more source

Susceptibility of Continual Learning Against Adversarial Attacks [PDF]

open access: green, 2022
Hikmat Ullah Khan   +3 more
openalex   +1 more source

Artificial intelligence‐enabled digital biomedical engineering

open access: yesBMEMat, EarlyView.
This review presents a comprehensive overview, emphasizing the critical role of artificial intelligence (AI) in biomedical engineering. It further explores the implications of AI for future biomedical research and clinical practice, aiming to provide theoretical insights for academic investigation and technological innovation in the field.
Peiran Song   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy