Results 61 to 70 of about 79,918 (254)

Deep Learning‐Assisted Design of Mechanical Metamaterials

open access: yesAdvanced Intelligent Discovery, EarlyView.
This review examines the role of data‐driven deep learning methodologies in advancing mechanical metamaterial design, focusing on the specific methodologies, applications, challenges, and outlooks of this field. Mechanical metamaterials (MMs), characterized by their extraordinary mechanical behaviors derived from architected microstructures, have ...
Zisheng Zong   +5 more
wiley   +1 more source

Exploring Synergy of Denoising and Distillation: Novel Method for Efficient Adversarial Defense

open access: yesApplied Sciences
Escalating advancements in artificial intelligence (AI) has prompted significant security concerns, especially with its increasing commercialization. This necessitates research on safety measures to securely utilize AI models.
Inpyo Hong, Sokjoon Lee
doaj   +1 more source

Adversarial Robust Aerial Image Recognition Based on Reactive-Proactive Defense Framework with Deep Ensembles

open access: yesRemote Sensing, 2023
As a safety-related application, visual systems based on deep neural networks (DNNs) in modern unmanned aerial vehicles (UAVs) show adversarial vulnerability when performing real-time inference.
Zihao Lu   +3 more
doaj   +1 more source

Detecting adversarial examples with inductive Venn-ABERS predictors [PDF]

open access: yes, 2019
Inductive Venn-ABERS predictors (IVAPs) are a type of probabilistic predictors with the theoretical guarantee that their predictions are perfectly calibrated.
Goossens, Bart   +2 more
core   +1 more source

Predicting Performance of Hall Effect Ion Source Using Machine Learning

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
This study introduces HallNN, a machine learning tool for predicting Hall effect ion source performance using a neural network ensemble trained on data generated from numerical simulations. HallNN provides faster and more accurate predictions than numerical methods and traditional scaling laws, making it valuable for designing and optimizing Hall ...
Jaehong Park   +8 more
wiley   +1 more source

Care and COVID 19: Lessons for liberals and neoliberals

open access: yesChild &Family Social Work, EarlyView., 2023
Abstract Within the liberal political traditions, care is regarded as a private matter, a problem of ethics rather than justice. Social justice is framed as an issue of economics (re/distribution), culture (recognition) and/or politics (representation).
Kathleen Lynch
wiley   +1 more source

Stylized Pairing for Robust Adversarial Defense

open access: yesApplied Sciences, 2022
Recent studies show that deep neural networks (DNNs)-based object recognition algorithms overly rely on object textures rather than global object shapes, and DNNs are also vulnerable to human-less perceptible adversarial perturbations. Based on these two
Dejian Guan, Wentao Zhao, Xiao Liu
doaj   +1 more source

MAD: Meta Adversarial Defense Benchmark

open access: yes, 2023
Adversarial training (AT) is a prominent technique employed by deep learning models to defend against adversarial attacks, and to some extent, enhance model robustness. However, there are three main drawbacks of the existing AT-based defense methods: expensive computational cost, low generalization ability, and the dilemma between the original model ...
Peng, X.   +4 more
openaire   +2 more sources

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

A divide-and-conquer reconstruction method for defending against adversarial example attacks

open access: yesVisual Intelligence
In recent years, defending against adversarial examples has gained significant importance, leading to a growing body of research in this area. Among these studies, pre-processing defense approaches have emerged as a prominent research direction. However,
Xiyao Liu   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy