Results 61 to 70 of about 237,731 (274)

Organic Electrochemical Transistors for Neuromorphic Devices and Applications

open access: yesAdvanced Materials, EarlyView.
Organic electrochemical transistors are emerging as promising platforms for neuromorphic devices that emulate neuronal and synaptic activities and can seamlessly integrate with biological systems. This review focuses on resultant organic artificial neurons, synapses, and integrated devices, with an emphasis on their ability to perform neuromorphic ...
Kexin Xiang   +4 more
wiley   +1 more source

Human-Producible Adversarial Examples

open access: yes, 2023
Submitted to ICLR ...
Khachaturov, David   +5 more
openaire   +2 more sources

Adversarial examples for models of code [PDF]

open access: yesProceedings of the ACM on Programming Languages, 2020
Neural models of code have shown impressive results when performing tasks such as predicting method names and identifying certain kinds of bugs. We show that these models are vulnerable to adversarial examples , and introduce a novel approach for attacking trained models of code using ...
Yefet, Noam, Alon, Uri, Yahav, Eran
openaire   +2 more sources

Self‐Assembled Monolayers in p–i–n Perovskite Solar Cells: Molecular Design, Interfacial Engineering, and Machine Learning–Accelerated Material Discovery

open access: yesAdvanced Materials, EarlyView.
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley   +1 more source

Electronic music assassin: towards imperceptible physical adversarial attacks against black-box automatic speech recognitions

open access: yesCybersecurity
Speech recognition technology has brought revolutionary changes to our lives, but existing work has demonstrated the feasibility of using adversarial examples (AEs) to mislead speech recognition systems. Most existing adversarial attacks are designed for
Ruiyuan Li
doaj   +1 more source

Materials and System Design for Self‐Decision Bioelectronic Systems

open access: yesAdvanced Materials, EarlyView.
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng   +9 more
wiley   +1 more source

Deep neural rejection against adversarial examples [PDF]

open access: yesEURASIP Journal on Information Security, 2020
AbstractDespite the impressive performances reported by deep neural networks in different application domains, they remain largely vulnerable to adversarial examples, i.e., input samples that are carefully perturbed to cause misclassification at test time.
Angelo Sotgiu   +6 more
openaire   +4 more sources

From the Discovery of the Giant Magnetocaloric Effect to the Development of High‐Power‐Density Systems

open access: yesAdvanced Materials Technologies, EarlyView.
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz   +5 more
wiley   +1 more source

Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space

open access: yesAdvanced Robotics Research, EarlyView.
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo   +6 more
wiley   +1 more source

Research on structure and defense of adversarial example in deep learning

open access: yes网络与信息安全学报, 2020
With the further promotion of deep learning technology in the fields of computer vision, network security and natural language processing, which has gradually exposed certain security risks.
DUAN Guanghan, SONG Lei   +1 more
doaj   +3 more sources

Home - About - Disclaimer - Privacy