Results 91 to 100 of about 8,712 (199)
Enhancing the Transferability of Adversarial Patch via Alternating Minimization
Adversarial patches, a type of adversarial example, pose serious security threats to deep neural networks (DNNs) by inducing erroneous outputs. Existing gradient stabilization methods aim to stabilize the optimization direction of adversarial examples ...
Yang Wang +3 more
doaj +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source
In this work, we have performed human‐based evaluation of three post hoc explainability techniques, Local Interpretable Model Agnostic Explanations (LIME), Shapely Additive Explanations (SHAP), and integrated Gradients (IG) for a multilingual Bidirectional Encoder Representations from Transformers (mBERT) based binary and multi‐label misogyny ...
Sargam Yadav +2 more
wiley +1 more source
Deep Learning for Satellite‐Based Forest Disturbance Monitoring: Recent Advances and Challenges
Overview of key research challenges in forest disturbance monitoring, including the detection of disturbances of varying severity, the attribution of disturbance agents, and the development of models capable of generalizing across regions. ABSTRACT Climate change and land use pressures are intensifying forest disturbances in many world regions, as ...
Carolina Natel +3 more
wiley +1 more source
Adversarial sample generation is a key research direction for uncovering the vulnerabilities of deep neural networks and improving the robustness of Synthetic Aperture Radar Automatic Target Recognition (SAR ATR) systems.
Xinyuan SU +4 more
doaj +1 more source
Adversarial Patch Attack for Ship Detection via Localized Augmentation
Current ship detection techniques based on remote sensing imagery primarily rely on the object detection capabilities of deep neural networks (DNNs). However, DNNs are vulnerable to adversarial patch attacks, which can lead to misclassification by the detection model or complete evasion of the targets.
Chun Liu 0008 +7 more
openaire +2 more sources
Relational legal consciousness and the mobilization of the law of the inquest in England and Wales
Abstract This article explores the legal consciousness of bereaved people in contact with the coronial system in England and Wales, drawing on an interview‐based empirical study. Informed by socio‐legal scholarship on relational dimensions of legal consciousness and citizens’ mobilization of the law, the article analyses the relationships within and ...
JESSICA JACOBSON +2 more
wiley +1 more source
Computational Modeling Meets 3D Bioprinting: Emerging Synergies in Cardiovascular Disease Modeling
Emerging advances in three‐dimensional bioprinting and computational modeling are reshaping cardiovascular (CV) research by enabling more realistic, patient‐specific tissue platforms. This review surveys cutting‐edge approaches that merge biomimetic CV constructs with computational simulations to overcome the limitations of traditional models, improve ...
Tanmay Mukherjee +7 more
wiley +1 more source
Evaluating the Utilities of Foundation Models in Single‐Cell Data Analysis
This study delivers the first systematic, task‐level evaluation of single‐cell foundation models across eight core analytical tasks. By benchmarking 10 leading models with the scEval framework, it reveals where foundation models truly add value, where task‐specific methods still dominate, and provides concrete, reproducible guidelines to steer the next
Tianyu Liu +4 more
wiley +1 more source
Block-level masking and feature importance-based adversarial example generation
This paper proposes a method to enhance the transferability of adversarial examples by combining a Learnable Patch-Wise Mask (LPM) generated through differential evolution algorithm with a Feature Importance Aware (FIA) attack.
Wenbo Qiu, Yafei Song
doaj +1 more source

