Results 111 to 120 of about 94,861 (274)
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
This article proposes a lightweight YOLOv4‐based detection model using MobileNetV3 or CSPDarknet53_tiny, achieving 30+ FPS and higher mAP. It also presents a ShuffleNet‐based classification model with transfer learning and GAN‐augmented images, improving generalization and accuracy.
Qingyang Liu, Yanrong Hu, Hongjiu Liu
wiley +1 more source
Adversarial method for malicious ELF file detection based on deep reinforcement learning
In recent years, research on detecting malicious executable and linkable format (ELF) files based on deep learning had made significant progress. At the same time, adversarial attacks on models had also gained widespread attention.
SUN He +5 more
doaj
IntroductionCyberattacks against Power Transformer Differential Protection (PTDP) have the potential to cause significant disruption and widespread blackouts in power infrastructure.
Martiya Zare Jahromi +4 more
doaj +1 more source
Detecting Adversarial Examples via Key-based Network
6 ...
Zhao, Pinlong +4 more
openaire +2 more sources
Elastic Fast Marching Learning from Demonstration
This article presents Elastic Fast Marching Learning (EFML), a novel approach for learning from demonstration that combines velocity‐based planning with elastic optimization. EFML enables smooth, precise, and adaptable robot trajectories in both position and orientation spaces.
Adrian Prados +3 more
wiley +1 more source
The rapid advancement and sophisticated deployment of artificial intelligence tools by malicious actors have led to the rise of highly complex cyber-attacks that evolve quickly.
Noora Al Roken +3 more
doaj +1 more source
Securing Generative Artificial Intelligence with Parallel Magnetic Tunnel Junction True Randomness
True random numbers can protect generative artificial intelligence (GAI) models from attacks. A highly parallel, spin‐transfer torque magnetic tunnel junction‐based system is demonstrated that generates high‐quality, energy‐efficient random numbers.
Youwei Bao, Shuhan Yang, Hyunsoo Yang
wiley +1 more source
A divide-and-conquer reconstruction method for defending against adversarial example attacks
In recent years, defending against adversarial examples has gained significant importance, leading to a growing body of research in this area. Among these studies, pre-processing defense approaches have emerged as a prominent research direction. However,
Xiyao Liu +5 more
doaj +1 more source
A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked infrared images. The encoder and decoder incorporate preprocessing steps, attention mechanisms, and activation functions suitable for infrared images.
Yu Bai +4 more
wiley +1 more source

