Results 81 to 90 of about 1,185,392 (332)
A survey of practical adversarial example attacks
Adversarial examples revealed the weakness of machine learning techniques in terms of robustness, which moreover inspired adversaries to make use of the weakness to attack systems employing machine learning.
Lu Sun, Mingtian Tan, Zhe Zhou
doaj +1 more source
While Machine Learning has become the holy grail of modern-day computing, it has many security flaws that have yet to be addressed and resolved. Adversarial attacks are one of these security flaws, in which an attacker appends noise to data samples that ...
Hiskias Dingeto, Juntae Kim
doaj +1 more source
We present Diffusion‐MRI‐based Estimation of Cortical Architecture via Machine Learning (DECAM), a deep‐learning framework for estimating primate brain cortical architecture optimized with best response constraint and cortical label vectors. Trained using macaque brain high‐resolution multi‐shell dMRI and histology data, DECAM generates high‐fidelity ...
Tianjia Zhu +7 more
wiley +1 more source
How to beat a Bayesian adversary
Deep neural networks and other modern machine learning models are often susceptible to adversarial attacks. Indeed, an adversary may often be able to change a model’s prediction through a small, directed perturbation of the model’s input – an issue in ...
Zihan Ding +3 more
doaj +1 more source
scPER presents an adversarial‐autoencoder framework that deconvolves bulk total RNA‐seq to quantify tumor‐microenvironment cell types and uncover phenotype‐linked subclusters. Across diverse benchmarks, scPER improves accuracy over existing tools.
Bingrui Li, Xiaobo Zhou, Raghu Kalluri
wiley +1 more source
Solid Harmonic Wavelet Bispectrum for Image Analysis
The Solid Harmonic Wavelet Bispectrum (SHWB), a rotation‐ and translation‐invariant descriptor that captures higher‐order (phase) correlations in signals, is introduced. Combining wavelet scattering, bispectral analysis, and group theory, SHWB achieves interpretable, data‐efficient representations and demonstrates competitive performance across texture,
Alex Brown +3 more
wiley +1 more source
Machine learning security and privacy:a survey
As an important method to implement artificial intelligence,machine learning technology is widely used in data mining,computer vision,natural language processing and other fields.With the development of machine learning,it brings amount of security and ...
Lei SONG,Chunguang MA,Guanghan DUAN
doaj +3 more sources
His‐MMDM: Multi‐Domain and Multi‐Omics Translation of Histopathological Images with Diffusion Models
His‐MMDM is a diffusion model‐based framework for scalable multi‐domain and multi‐omics translation of histopathological images, enabling tasks from virtual staining, cross‐tumor knowledge transfer, and omics‐guided image editing. ABSTRACT Generative AI (GenAI) has advanced computational pathology through various image translation models.
Zhongxiao Li +13 more
wiley +1 more source
Nanozymes Integrated Biochips Toward Smart Detection System
This review systematically outlines the integration of nanozymes, biochips, and artificial intelligence (AI) for intelligent biosensing. It details how their convergence enhances signal amplification, enables portable detection, and improves data interpretation.
Dongyu Chen +10 more
wiley +1 more source
This review comprehensively summarizes the atomic defects in TMDs for their applications in sustainable energy storage devices, along with the latest progress in ML methodologies for high‐throughput TEM data analysis, offering insights on how ML‐empowered microscopy facilitates bridging structure–property correlation and inspires knowledge for precise ...
Zheng Luo +6 more
wiley +1 more source

