Results 111 to 120 of about 94,861 (274)

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

Multitarget Recognition of Flower Images Based on Lightweight Deep Neural Network and Transfer Learning

open access: yesAdvanced Intelligent Systems, EarlyView.
This article proposes a lightweight YOLOv4‐based detection model using MobileNetV3 or CSPDarknet53_tiny, achieving 30+ FPS and higher mAP. It also presents a ShuffleNet‐based classification model with transfer learning and GAN‐augmented images, improving generalization and accuracy.
Qingyang Liu, Yanrong Hu, Hongjiu Liu
wiley   +1 more source

Adversarial method for malicious ELF file detection based on deep reinforcement learning

open access: yes网络与信息安全学报
In recent years, research on detecting malicious executable and linkable format (ELF) files based on deep learning had made significant progress. At the same time, adversarial attacks on models had also gained widespread attention.
SUN He   +5 more
doaj  

Towards a more secure reconstruction-based anomaly detection model for power transformer differential protection

open access: yesFrontiers in Energy Research
IntroductionCyberattacks against Power Transformer Differential Protection (PTDP) have the potential to cause significant disruption and widespread blackouts in power infrastructure.
Martiya Zare Jahromi   +4 more
doaj   +1 more source

Detecting Adversarial Examples via Key-based Network

open access: yes, 2018
6 ...
Zhao, Pinlong   +4 more
openaire   +2 more sources

Elastic Fast Marching Learning from Demonstration

open access: yesAdvanced Intelligent Systems, EarlyView.
This article presents Elastic Fast Marching Learning (EFML), a novel approach for learning from demonstration that combines velocity‐based planning with elastic optimization. EFML enables smooth, precise, and adaptable robot trajectories in both position and orientation spaces.
Adrian Prados   +3 more
wiley   +1 more source

On adversarial attack detection in the artificial intelligence era: Fundamentals, a taxonomy, and a review

open access: yesIntelligent Systems with Applications
The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly.
Noora Al Roken   +3 more
doaj   +1 more source

Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness

open access: yesAdvanced Intelligent Systems, EarlyView.
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley   +1 more source

A divide-and-conquer reconstruction method for defending against adversarial example attacks

open access: yesVisual Intelligence
In recent years, defending against adversarial examples has gained significant importance, leading to a growing body of research in this area. Among these studies, pre-processing defense approaches have emerged as a prominent research direction. However,
Xiyao Liu   +5 more
doaj   +1 more source

A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images

open access: yesAdvanced Intelligent Systems, EarlyView.
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked infrared images. The encoder and decoder incorporate preprocessing steps, attention mechanisms, and activation functions suitable for infrared images.
Yu Bai   +4 more
wiley   +1 more source

Home - About - Disclaimer - Privacy