Results 171 to 180 of about 243,531 (318)
Enhancing Cross-task Black-Box Transferability of Adversarial Examples with Dispersion Reduction [PDF]
Yantao Lu +6 more
openalex +1 more source
A Bayesian-network-based cybersecurity adversarial risk analysis framework with numerical examples [PDF]
Jiali Wang, Martin Neil
openalex +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Adversarial Examples Might be Avoidable: The Role of Data Concentration in Adversarial Robustness [PDF]
Ambar Pal, Jeremias Sulam, Renè Vidal
openalex +1 more source
Xstainer: A Novel Virtual Staining Tool Powered by Advanced Deep Learning Techniques
Xstainer is a deep learning–based virtual staining framework that converts hematoxylin and eosin‐stained whole slide images into multiple histochemical stains, including Masson's trichrome, Periodic acid‐Schiff, Jones methenamine silver, and Toluidine blue.
Fatma Nur Kinali +15 more
wiley +1 more source
ABSTRACT The rapid evolution of the Internet of Things (IoT) has significantly advanced the field of electrocardiogram (ECG) monitoring, enabling real‐time, remote, and patient‐centric cardiac care. This paper presents a comprehensive survey of AI assisted IoT‐based ECG monitoring systems, focusing on the integration of emerging technologies such as ...
Amrita Choudhury +2 more
wiley +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
Detecting Adversarial Examples in Convolutional Neural Networks [PDF]
Stefanos Pertigkiozoglou, Petros Maragos
openalex +1 more source
Identification of Attack-Specific Signatures in Adversarial Examples [PDF]
Hossein Souri +4 more
openalex +1 more source
ABSTRACT For adults with intellectual disability and their families, future planning and moving out of the family home in Australia will increasingly occur within the context of the National Disability Insurance Scheme (NDIS). As a market‐based, individualised funding system its impact on this transition remains largely unknown. This paper reports on a
I. Belperio +5 more
wiley +1 more source

