Results 81 to 90 of about 172,371 (266)

Adversarial Robustness by One Bit Double Quantization for Visual Classification

open access: yesIEEE Access, 2019
In this paper, we propose a novel robust visual classification framework that uses double quantization (dquant) to defend against adversarial examples in a specific attack scenario called “subsequent adversarial examples” where test images ...
Maungmaung Aprilpyone   +2 more
doaj   +1 more source

Provably Robust Adversarial Examples

open access: yes, 2020
International Conference on Learning Representations (ICLR 2022)
Dimitrov, Dimitar Iliev   +3 more
openaire   +3 more sources

His‐MMDM: Multi‐Domain and Multi‐Omics Translation of Histopathological Images with Diffusion Models

open access: yesAdvanced Science, EarlyView.
His‐MMDM is a diffusion model‐based framework for scalable multi‐domain and multi‐omics translation of histopathological images, enabling tasks from virtual staining, cross‐tumor knowledge transfer, and omics‐guided image editing. ABSTRACT Generative AI (GenAI) has advanced computational pathology through various image translation models.
Zhongxiao Li   +13 more
wiley   +1 more source

Understanding adversarial robustness against on-manifold adversarial examples

open access: yesPattern Recognition
Deep neural networks (DNNs) are shown to be vulnerable to adversarial examples. A well-trained model can be easily attacked by adding small perturbations to the original data. One of the hypotheses of the existence of the adversarial examples is the off-manifold assumption: adversarial examples lie off the data manifold. However, recent research showed
Jiancong Xiao   +4 more
openaire   +2 more sources

Spatially Transformed Adversarial Examples

open access: yes, 2018
Recent studies show that widely used deep neural networks (DNNs) are vulnerable to carefully crafted adversarial examples. Many advanced algorithms have been proposed to generate adversarial examples by leveraging the $\mathcal{L}_p$ distance for penalizing perturbations.
Xiao, Chaowei   +5 more
openaire   +2 more sources

Nanozymes Integrated Biochips Toward Smart Detection System

open access: yesAdvanced Science, EarlyView.
This review systematically outlines the integration of nanozymes, biochips, and artificial intelligence (AI) for intelligent biosensing. It details how their convergence enhances signal amplification, enables portable detection, and improves data interpretation.
Dongyu Chen   +10 more
wiley   +1 more source

Reconstructing Coherent Functional Landscape From Multi‐Modal Multi‐Slice Spatial Transcriptomics by a Variational Spatial Gaussian Process

open access: yesAdvanced Science, EarlyView.
This study introduces stVGP, a variational spatial Gaussian process framework for multi‐modal, multi‐slice spatial transcriptomics. By integrating histological and genomic data through hybrid alignment and attention‐based fusion, stVGP reconstructs coherent 3D functional landscapes.
Zedong Wang   +3 more
wiley   +1 more source

Adversarial Examples for CNN-Based Malware Detectors

open access: yesIEEE Access, 2019
The convolutional neural network (CNN)-based models have achieved tremendous breakthroughs in many end-to-end applications, such as image identification, text classification, and speech recognition.
Bingcai Chen   +4 more
doaj   +1 more source

Photoacoustic Microscopy for Multiscale Biological System Visualization and Clinical Translation

open access: yesAdvanced Science, EarlyView.
Photoacoustic microscopy (PAM) is a powerful biomedical imaging tool renowned for its non‐invasiveness and high resolution. This review synthesizes recent technological advances and highlights their broad applications from cellular and organ‐level to whole‐animal imaging.
Tingting Wang   +3 more
wiley   +1 more source

Detecting Adversarial Examples

open access: yes
Deep Neural Networks (DNNs) have been shown to be vulnerable to adversarial examples. While numerous successful adversarial attacks have been proposed, defenses against these attacks remain relatively understudied. Existing defense approaches either focus on negating the effects of perturbations caused by the attacks to restore the DNNs' original ...
Mumcu, Furkan, Yilmaz, Yasin
openaire   +2 more sources

Home - About - Disclaimer - Privacy