Results 51 to 60 of about 79,918 (254)
A Bottom‐Up Design Framework for Multifunctional Lattice Metamaterials
This study introduces a generative AI framework for designing multifunctional lattice metamaterials. The method combines 3D Gaussian voxel generation with deep learning, enabling greater design freedom and structural performance. The optimized lattice metamaterials achieve enhanced energy absorption by 40–200% compared to conventional structures and ...
Zongxin Hu +13 more
wiley +1 more source
Adversarial Sample Detection for Deep Neural Network through Model Mutation Testing
Deep neural networks (DNN) have been shown to be useful in a wide range of applications. However, they are also known to be vulnerable to adversarial samples.
Dong, Guoliang +4 more
core +1 more source
This review comprehensively summarizes the atomic defects in TMDs for their applications in sustainable energy storage devices, along with the latest progress in ML methodologies for high‐throughput TEM data analysis, offering insights on how ML‐empowered microscopy facilitates bridging structure–property correlation and inspires knowledge for precise ...
Zheng Luo +6 more
wiley +1 more source
Neural networks are vulnerable to meticulously crafted adversarial examples, leading to high-confidence misclassifications in image classification tasks. Due to their consistency with regular input patterns and the absence of reliance on the target model
Xinlei Liu +6 more
doaj +1 more source
GUARD: Graph Universal Adversarial Defense
Graph convolutional networks (GCNs) have been shown to be vulnerable to small adversarial perturbations, which becomes a severe threat and largely limits their applications in security-critical scenarios. To mitigate such a threat, considerable research efforts have been devoted to increasing the robustness of GCNs against adversarial attacks. However,
Jintang Li +7 more
openaire +2 more sources
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu +5 more
wiley +1 more source
A Robust CycleGAN-L2 Defense Method for Speaker Recognition System
With the rapid development of voice technology, speaker recognition is becoming increasingly prevalent in our daily lives. However, with its increased usage, security issues have become more apparent.
Lingyi Yang +3 more
doaj +1 more source
Deep Learning‐Assisted Coherent Raman Scattering Microscopy
The analytical capabilities of coherent Raman scattering microscopy are augmented through deep learning integration. This synergistic paradigm improves fundamental performance via denoising, deconvolution, and hyperspectral unmixing. Concurrently, it enhances downstream image analysis including subcellular localization, virtual staining, and clinical ...
Jianlin Liu +4 more
wiley +1 more source
Deep learning-based automatic modulation recognition networks are susceptible to adversarial attacks, posing significant performance vulnerabilities. In response, we introduce a defense framework enriched by tailored autoencoder (AE) techniques.
Chao Han +5 more
doaj +1 more source
Scaling provable adversarial defenses
Recent work has developed methods for learning deep network classifiers that are provably robust to norm-bounded adversarial perturbation; however, these methods are currently only possible for relatively small feedforward networks. In this paper, in an effort to scale these approaches to substantially larger models, we extend previous work in three ...
Wong, Eric +3 more
openaire +2 more sources

