Results 101 to 110 of about 172,371 (266)

Towards Interpretable Adversarial Examples via Sparse Adversarial Attack

open access: yes
Sparse attacks are to optimize the magnitude of adversarial perturbations for fooling deep neural networks (DNNs) involving only a few perturbed pixels (i.e., under the l0 constraint), suitable for interpreting the vulnerability of DNNs. However, existing solutions fail to yield interpretable adversarial examples due to their poor sparsity. Worse still,
Lin, Fudong   +4 more
openaire   +2 more sources

Trace-Norm Adversarial Examples

open access: yes, 2020
White box adversarial perturbations are sought via iterative optimization algorithms most often minimizing an adversarial loss on a $l_p$ neighborhood of the original image, the so-called distortion set. Constraining the adversarial search with different norms results in disparately structured adversarial examples.
Kazemi, Ehsan   +2 more
openaire   +2 more sources

Generative Artificial Intelligence Shaping the Future of Agri‐Food Innovation

open access: yesAgriFood: Journal of Agricultural Products for Food, EarlyView.
Emerging use cases of generative artificial intelligence in agri‐food innovation. ABSTRACT The recent surge in generative artificial intelligence (AI), typified by models such as GPT, diffusion models, and large vision‐language architectures, has begun to influence the agri‐food sector.
Jun‐Li Xu   +2 more
wiley   +1 more source

SAR-SPA: Incorporating Target Scattering Characteristic Parameters in Adversarial Example Generation for SAR Imagery

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Deep neural networks (DNNs)-based SAR target recognition models are susceptible to adversarial examples, which significantly reduce model robustness. Current methods for generating adversarial examples for SAR imagery primarily operate in the 2-D digital
Jiahao Cui   +5 more
doaj   +1 more source

Research on Image Adversarial Example Generation Method Based on SE-AdvGAN [PDF]

open access: yesJisuanji gongcheng
Adversarial examples are crucial for evaluating the robustness of Deep Neural Network (DNN) and revealing their potential security risks. The adversarial example generation method based on a Generative Adversarial Network (GAN), AdvGAN, has made ...
ZHAO Hong, SONG Furong, LI Wengai
doaj   +1 more source

Experimental validation of the RESPONSE framework against cyberattacks on cyber‐physical process systems

open access: yesAIChE Journal, EarlyView.
Abstract This work experimentally validates the RESPONSE (Resilient Process cONtrol SystEm) framework as a solution for maintaining safe, continuous operation of cyber‐physical process systems under cyberattacks. RESPONSE implements a dual‐loop architecture that runs a networked online controller in parallel with a hard‐isolated offline controller ...
Luyang Liu   +5 more
wiley   +1 more source

Domain‐Aware Implicit Network for Arbitrary‐Scale Remote Sensing Image Super‐Resolution

open access: yesAdvanced Intelligent Discovery, EarlyView.
Although existing arbitrary‐scale image super‐resolution methods are flexible to reconstruct images with arbitrary scales, the characteristic of training distribution is neglected that there exists domain shift between samples of various scales. In this work, a Domain‐Aware Implicit Network (DAIN) is proposed to handle it from the perspective of domain
Xiaoxuan Ren   +6 more
wiley   +1 more source

What to Make and How to Make It: Combining Machine Learning and Statistical Learning to Design New Materials

open access: yesAdvanced Intelligent Discovery, EarlyView.
Combining machine learning and probabilistic statistical learning is a powerful way to discover and design new materials. A variety of machine learning approaches can be used to identify promising candidates for target applications, and causal inference can help identify potential ways to make them a reality.
Jonathan Y. C. Ting, Amanda S. Barnard
wiley   +1 more source

Adversarial Examples for Electrocardiograms

open access: yes, 2019
In recent years, the electrocardiogram (ECG) has seen a large diffusion in both medical and commercial applications, fueled by the rise of single-lead versions. Single-lead ECG can be embedded in medical devices and wearable products such as the injectable Medtronic Linq monitor, the iRhythm Ziopatch wearable monitor, and the Apple Watch Series 4 ...
Han, Xintian   +5 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy