Results 51 to 60 of about 82,924 (315)

From the Discovery of the Giant Magnetocaloric Effect to the Development of High‐Power‐Density Systems

open access: yesAdvanced Materials Technologies, EarlyView.
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz   +5 more
wiley   +1 more source

Survey on adversarial attacks and defenses for object detection

open access: yesTongxin xuebao, 2023
In response to recent developments in adversarial attacks and defenses for object detection, relevant terms and concepts associated with object detection and adversarial learning were first introduced.Subsequently, according to the evolution process of ...
Xinxin WANG   +6 more
doaj   +2 more sources

A Mask-Based Adversarial Defense Scheme

open access: yesAlgorithms, 2022
Adversarial attacks hamper the functionality and accuracy of deep neural networks (DNNs) by meddling with subtle perturbations to their inputs. In this work, we propose a new mask-based adversarial defense scheme (MAD) for DNNs to mitigate the negative ...
Weizhen Xu   +3 more
doaj   +1 more source

Information Transmission Strategies for Self‐Organized Robotic Aggregation

open access: yesAdvanced Robotics Research, EarlyView.
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng   +5 more
wiley   +1 more source

You Can’t Fool All the Models: Detect Adversarial Samples via Pruning Models

open access: yesIEEE Access, 2021
Many adversarial attack methods have investigated the security issue of deep learning models. Previous works on detecting adversarial samples show superior in accuracy but consume too much memory and computing resources.
Renxuan Wang   +3 more
doaj   +1 more source

Atomic Defects in Layered Transition Metal Dichalcogenides for Sustainable Energy Storage and the Intelligent Trends in Data Analytics

open access: yesAdvanced Science, EarlyView.
This review comprehensively summarizes the atomic defects in TMDs for their applications in sustainable energy storage devices, along with the latest progress in ML methodologies for high‐throughput TEM data analysis, offering insights on how ML‐empowered microscopy facilitates bridging structure–property correlation and inspires knowledge for precise ...
Zheng Luo   +6 more
wiley   +1 more source

Adversarial Example Defenses: Ensembles of Weak Defenses are not Strong

open access: yesCoRR, 2017
Ongoing research has proposed several methods to defend neural networks against adversarial examples, many of which researchers have shown to be ineffective. We ask whether a strong defense can be created by combining multiple (possibly weak) defenses. To answer this question, we study three defenses that follow this approach. Two of these are recently
Warren He   +4 more
openaire   +3 more sources

Deep Learning‐Assisted Coherent Raman Scattering Microscopy

open access: yesAdvanced Intelligent Discovery, EarlyView.
The analytical capabilities of coherent Raman scattering microscopy are augmented through deep learning integration. This synergistic paradigm improves fundamental performance via denoising, deconvolution, and hyperspectral unmixing. Concurrently, it enhances downstream image analysis including subcellular localization, virtual staining, and clinical ...
Jianlin Liu   +4 more
wiley   +1 more source

Mape: defending against transferable adversarial attacks using multi-source adversarial perturbations elimination

open access: yesComplex & Intelligent Systems
Neural networks are vulnerable to meticulously crafted adversarial examples, leading to high-confidence misclassifications in image classification tasks. Due to their consistency with regular input patterns and the absence of reliance on the target model
Xinlei Liu   +6 more
doaj   +1 more source

Defense-VAE: A Fast and Accurate Defense Against Adversarial Attacks [PDF]

open access: yes, 2020
Deep neural networks (DNNs) have been enormously successful across a variety of prediction tasks. However, recent research shows that DNNs are particularly vulnerable to adversarial attacks, which poses a serious threat to their applications in security-sensitive systems.
Xiang Li 0080, Shihao Ji 0001
openaire   +2 more sources

Home - About - Disclaimer - Privacy