Results 11 to 20 of about 1,118 (118)
A Multi-Property Optimizing Generative Adversarial Network for de novo Antimicrobial Peptide Design. [PDF]
A Multi‐Property Optimizing Generative Adversarial Network (MPOGAN) is proposed to iteratively learn the relationship between peptides and multiple properties using a dynamically dataset. As the quality of the dataset improves, MPOGAN's ability to design antimicrobial peptides (AMPs) with multiple desired properties is enhanced.
Liu J +16 more
europepmc +2 more sources
Accelerating Catalyst Materials Discovery With Large Artificial Intelligence Models
AI‐empowered catalysis research via integrated database platform, universal machine learning interatomic potentials (MLIPs), and large language models (LLMs). ABSTRACT The integration of artificial intelligence (AI) into catalysis is fundamentally reshaping the research paradigm of catalyst discovery.
Di Zhang +7 more
wiley +2 more sources
Differentiable sampling of molecular geometries with uncertainty-based adversarial attacks
Neural network (NN) interatomic potentials provide fast prediction of potential energy surfaces, closely matching the accuracy of the electronic structure methods used to produce the training data.
Gómez-Bombarelli, Rafael +2 more
core +1 more source
Recognition model of IIoT equipment in coal mine
The computing and storage resources of the industrial Internet of things (IIoT) equipment in the coal mine are limited, making it vulnerable to illegal network intrusion, causing sensitive data leakage or malicious tampering, and threatening the safety ...
HAO Qinxia, LI Huimin
doaj +1 more source
Transparency overlays and applications [PDF]
In this paper, we initiate a formal study of transparency, which in recent years has become an increasingly critical requirement for the systems in which people place trust.
Chase, M, Meiklejohn, S
core +3 more sources
A secure privacy preserving deduplication scheme for cloud computing [PDF]
© 2019 Elsevier B.V. Data deduplication is a key technique to improve storage efficiency in cloud computing. By pointing redundant files to a single copy, cloud service providers greatly reduce their storage space as well as data transfer costs.
Fan, Y +4 more
core +1 more source
Context-Aware Generative Adversarial Privacy
Preserving the utility of published datasets while simultaneously providing provable privacy guarantees is a well-known challenge. On the one hand, context-free privacy solutions, such as differential privacy, provide strong privacy guarantees, but often
Chen, Xiao +4 more
core +2 more sources
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
This study aims to perform a thorough systematic review investigating and synthesizing existing research on defense strategies and methodologies in adversarial attacks using machine learning (ML) and deep learning methods.
Khaleel Yahya Layth +5 more
doaj +1 more source
MojiTalk: Generating Emotional Responses at Scale
Generating emotional language is a key step towards building empathetic natural language processing agents. However, a major challenge for this line of research is the lack of large-scale labeled training data, and previous studies are limited to only ...
Wang, William Yang, Zhou, Xianda
core +1 more source

