Results 71 to 80 of about 1,185,392 (332)
Serangan adversarial pada citra digital merupakan ancaman serius bagi penggunaan teknologi machine learning dalam berbagai aplikasi kehidupan sehari-hari. Teknik Fast Gradient Sign Method (FGSM) telah terbukti efektif dalam melakukan serangan pada model
Putu Widiarsa Kurniawan S +2 more
doaj +1 more source
Information Transmission Strategies for Self‐Organized Robotic Aggregation
In this review, we discuss how information transmission influences the neighbor‐based self‐organized aggregation of swarm robots. We focus specifically on local interactions regarding information transfer and categorize previous studies based on the functions of the information exchanged.
Shu Leng +5 more
wiley +1 more source
SURVEY AND PROPOSED METHOD TO DETECT ADVERSARIAL EXAMPLES USING AN ADVERSARIAL RETRAINING MODEL
Artificial intelligence (AI) has found applications across various sectors and industries, offering numerous advantages to human beings. One prominent area where AI has made significant contributions is in machine learning models.
Thanh Son Phan +3 more
doaj +1 more source
Continual Learning for Multimodal Data Fusion of a Soft Gripper
Models trained on a single data modality often struggle to generalize when exposed to a different modality. This work introduces a continual learning algorithm capable of incrementally learning different data modalities by leveraging both class‐incremental and domain‐incremental learning scenarios in an artificial environment where labeled data is ...
Nilay Kushawaha, Egidio Falotico
wiley +1 more source
Enhancing adversarial robustness of quantum neural networks by adding noise layers
The rapid advancements in machine learning and quantum computing have given rise to a new research frontier: quantum machine learning. Quantum models designed for tackling classification problems possess the potential to deliver speed enhancements and ...
Chenyi Huang, Shibin Zhang
doaj +1 more source
On the Exploitability of Audio Machine Learning Pipelines to Surreptitious Adversarial Examples [PDF]
Adelin Travers +6 more
openalex +1 more source
CellPolaris decodes how transcription factors guide cell fate by building gene regulatory networks from transcriptomic data using transfer learning. It generates tissue‐ and cell‐type‐specific networks, identifies master regulators in cell state transitions, and simulates TF perturbations in developmental processes.
Guihai Feng +27 more
wiley +1 more source
AutoBayes: Automated Bayesian Graph Exploration for Nuisance- Robust Inference
Learning data representations that capture task-related features, but are invariant to nuisance variations remains a key challenge in machine learning.
Andac Demir +3 more
doaj +1 more source
Membership Inference Attacks Against Machine Learning Models [PDF]
We quantitatively investigate how machine learning models leak information about the individual data records on which they were trained. We focus on the basic membership inference attack: given a data record and black-box access to a model, determine if ...
R. Shokri +3 more
semanticscholar +1 more source
This study presents a novel microscopic imaging system capable of rapid, section‐free scanning of irregular tissue surfaces, delivering high sensitivity for detecting cancer cell clusters during intraoperative tumor margin assessment. Abstract Rapid and accurate intraoperative examination of tumor margins is crucial for precise surgical treatment, yet ...
Zhicheng Shao +17 more
wiley +1 more source

