Results 151 to 160 of about 160,235 (299)
GAN‐LSTM‐3D: An efficient method for lung tumour 3D reconstruction enhanced by attention‐based LSTM
Abstract Three‐dimensional (3D) image reconstruction of tumours can visualise their structures with precision and high resolution. In this article, GAN‐LSTM‐3D method is proposed for 3D reconstruction of lung cancer tumours from 2D CT images. Our method consists of three phases: lung segmentation, tumour segmentation, and tumour 3D reconstruction. Lung
Lu Hong +12 more
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
Explainable human‐in‐the‐loop healthcare image information quality assessment and selection
Abstract Smart healthcare applications cannot be separated from healthcare data analysis and the interactive interpretability between data and model. A human‐in‐the‐loop active learning approach is introduced to reduce the cost of healthcare data labelling by evaluating the information quality of unlabelled medical data and then screening the high ...
Yang Li, Sezai Ercisli
wiley +1 more source
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom +2 more
wiley +1 more source
Abstract Autonomous vehicles are required to operate in an uncertain environment. Recent advances in computational intelligence techniques make it possible to understand driving scenes in various environments by using a semantic segmentation neural network, which assigns a class label to each pixel.
Yining Hua +4 more
wiley +1 more source
Roadmap of Adversarial Machine Learning in Internet of Things-Enabled Security Systems. [PDF]
Harbi Y +4 more
europepmc +1 more source
Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning [PDF]
Jirong Yi, Raghu Mudumbai, Weiyu Xu
openalex +1 more source
A Deep Learning Framework for Forecasting Medium‐Term Covariance in Multiasset Portfolios
ABSTRACT Forecasting the covariance matrix of asset returns is central to portfolio construction, risk management, and asset pricing. However, most existing models struggle at medium‐term horizons, several weeks to months, where shifting market regimes and slower dynamics prevail.
Pedro Reis, Ana Paula Serra, João Gama
wiley +1 more source
Detection of GPS Spoofing Attacks in UAVs Based on Adversarial Machine Learning Model. [PDF]
Alhoraibi L, Alghazzawi D, Alhebshi R.
europepmc +1 more source
Artificial Intelligence in Ophthalmology: Current Status, Challenges, and Future Perspectives
Current research of artificial intelligence (AI) in ophthalmology. ABSTRACT Artificial intelligence (AI) is revolutionizing ophthalmology by providing innovative solutions for disease screening, diagnosis, personalized treatment, and the delivery of global healthcare services.
She Chongyang, Tao Yong
wiley +1 more source

