Results 61 to 70 of about 243,531 (318)
It has been shown that adversaries can craft example inputs to neural networks which are similar to legitimate inputs but have been created to purposely cause the neural network to misclassify the input.
Athalye Anish +18 more
core +1 more source
Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong +7 more
wiley +1 more source
Deep neural networks (DNNs) have useful applications in machine learning tasks involving recognition and pattern analysis. Despite the favorable applications of DNNs, these systems can be exploited by adversarial examples.
Hyun Kwon +3 more
doaj +1 more source
Downstream-agnostic Adversarial Examples
This paper has been accepted by the International Conference on Computer Vision (ICCV '23, October 2--6, 2023, Paris, France)
Ziqi Zhou 0001 +6 more
openaire +2 more sources
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley +1 more source
Robust Audio Adversarial Example for a Physical Attack
We propose a method to generate audio adversarial examples that can attack a state-of-the-art speech recognition model in the physical world. Previous work assumes that generated adversarial examples are directly fed to the recognition model, and is not ...
Sakuma, Jun, Yakura, Hiromu
core +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source
Speech recognition technology has brought revolutionary changes to our lives, but existing work has demonstrated the feasibility of using adversarial examples (AEs) to mislead speech recognition systems. Most existing adversarial attacks are designed for
Ruiyuan Li
doaj +1 more source
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model
Recent adversarial attack research reveals the vulnerability of learning-based deep learning models (DNN) against well-designed perturbations. However, most existing attack methods have inherent limitations in image quality as they rely on a relatively ...
Renyang Liu +10 more
doaj +1 more source
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz +5 more
wiley +1 more source

