Results 11 to 20 of about 1,118 (118)

A Multi-Property Optimizing Generative Adversarial Network for de novo Antimicrobial Peptide Design. [PDF]

open access: yesAdv Sci (Weinh)
A Multi‐Property Optimizing Generative Adversarial Network (MPOGAN) is proposed to iteratively learn the relationship between peptides and multiple properties using a dynamically dataset. As the quality of the dataset improves, MPOGAN's ability to design antimicrobial peptides (AMPs) with multiple desired properties is enhanced.
Liu J   +16 more
europepmc   +2 more sources

Accelerating Catalyst Materials Discovery With Large Artificial Intelligence Models

open access: yesAngewandte Chemie, Volume 138, Issue 16, 13 April 2026.
AI‐empowered catalysis research via integrated database platform, universal machine learning interatomic potentials (MLIPs), and large language models (LLMs). ABSTRACT The integration of artificial intelligence (AI) into catalysis is fundamentally reshaping the research paradigm of catalyst discovery.
Di Zhang   +7 more
wiley   +2 more sources

Differentiable sampling of molecular geometries with uncertainty-based adversarial attacks

open access: yes, 2021
Neural network (NN) interatomic potentials provide fast prediction of potential energy surfaces, closely matching the accuracy of the electronic structure methods used to produce the training data.
Gómez-Bombarelli, Rafael   +2 more
core   +1 more source

Recognition model of IIoT equipment in coal mine

open access: yesGong-kuang zidonghua
The computing and storage resources of the industrial Internet of things (IIoT) equipment in the coal mine are limited, making it vulnerable to illegal network intrusion, causing sensitive data leakage or malicious tampering, and threatening the safety ...
HAO Qinxia, LI Huimin
doaj   +1 more source

Transparency overlays and applications [PDF]

open access: yes, 2016
In this paper, we initiate a formal study of transparency, which in recent years has become an increasingly critical requirement for the systems in which people place trust.
Chase, M, Meiklejohn, S
core   +3 more sources

A secure privacy preserving deduplication scheme for cloud computing [PDF]

open access: yes, 2019
© 2019 Elsevier B.V. Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs.
Fan, Y   +4 more
core   +1 more source

Context-Aware Generative Adversarial Privacy

open access: yes, 2017
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often
Chen, Xiao   +4 more
core   +2 more sources

From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆

open access: yesCAAI Transactions on Intelligence Technology, EarlyView.
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang   +5 more
wiley   +1 more source

Network and cybersecurity applications of defense in adversarial attacks: A state-of-the-art using machine learning and deep learning methods

open access: yesJournal of Intelligent Systems
This study aims to perform a thorough systematic review investigating and synthesizing existing research on defense strategies and methodologies in adversarial attacks using machine learning (ML) and deep learning methods.
Khaleel Yahya Layth   +5 more
doaj   +1 more source

MojiTalk: Generating Emotional Responses at Scale

open access: yes, 2018
Generating emotional language is a key step towards building empathetic natural language processing agents. However, a major challenge for this line of research is the lack of large-scale labeled training data, and previous studies are limited to only ...
Wang, William Yang, Zhou, Xianda
core   +1 more source

Home - About - Disclaimer - Privacy