Results 221 to 230 of about 172,371 (266)
Novel molecule design with POWGAN, a policy-optimized Wasserstein generative adversarial network. [PDF]
Macedo B, Vaz IR, Gomes TT.
europepmc +1 more source
ABSTRACT This study examines the role of social capital in designing and implementing more effective governance strategies to improve the state of the Tagus River's significantly deteriorated middle reach (Spain). We employed social network analysis (SNA) to evaluate the bonding, bridging and linking social capital and the quality of stakeholder ...
Leticia Blázquez +2 more
wiley +1 more source
Investigating vulnerabilities of gait recognition model using latent-based perturbations. [PDF]
Ali Z +5 more
europepmc +1 more source
Integrating multimodal data and machine learning for entrepreneurship research
Abstract Research Summary Extant research in neuroscience suggests that human perception is multimodal in nature—we model the world integrating diverse data sources such as sound, images, taste, and smell. Working in a dynamic environment, entrepreneurs are expected to draw on multimodal inputs in their decision making.
Yash Raj Shrestha, Vivianna Fang He
wiley +1 more source
Diversity-enhanced reconstruction as plug-in defenders against adversarial perturbations. [PDF]
Pang Z, Yan X, Guo S, Lu Y.
europepmc +1 more source
Abstract Research Summary Firm technological research has the potential to spawn multiple applications. Despite recognizing such potential, past literature disagrees on the process through which firms discover and grow new applications out of their past technological research.
Xirong (Subrina) Shen
wiley +1 more source
Neuromorphic computing paradigms enhance robustness through spiking neural networks. [PDF]
Ding J, Yu Z, Liu JK, Huang T.
europepmc +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Segment and Recover: Defending Object Detectors Against Adversarial Patch Attacks. [PDF]
Gu H, Jafarnejadsani H.
europepmc +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source

