Results 101 to 110 of about 8,712 (199)
In the evolving landscape of deep neural network security, adversarial patch attacks present a serious challenge for object detection systems. We introduce OD-Shield, a novel defense approach that employs a convolutional autoencoder framework to detect ...
Byeongchan Kim +6 more
doaj +1 more source
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
Patch is enough: naturalistic adversarial patch against vision-language pre-training models
Visual language pre-training (VLP) models have demonstrated significant success in various domains, but they remain vulnerable to adversarial attacks. Addressing these adversarial vulnerabilities is crucial for enhancing security in multi-modal learning.
Dehong Kong +4 more
doaj +1 more source
Scalable One-Pixel Attacks on Deep Neural Networks for High-Resolution Images
Recent studies have shown that deep neural networks can be misled by adversarial examples that involve only imperceptible perturbations. Among these, one-pixel attacks (OPA) represent an extreme yet powerful threat, as they alter only a single pixel of ...
Wonhong Nam +3 more
doaj +1 more source
Maintaining power quality (PQ) and minimizing carbon emissions are crucial for sustainable smart grids, especially with increasing renewable energy integration. This paper proposes a novel method combining Adaptive Q‐Wavelet Transform (AQWT) and Kalman Filtering (KF) to predict PQ disturbances and faults while analyzing their impact on carbon emissions.
Abhishek Raj +9 more
wiley +1 more source
Perceptual Carlini-Wagner Attack: A Robust and Imperceptible Adversarial Attack Using LPIPS
Adversarial attacks on deep neural networks (DNNs) present significant challenges by exploiting model vulnerabilities using perturbations that are often imperceptible to human observers.
Liming Fan +3 more
doaj +1 more source
ABSTRACT Personal autonomous vehicles can sense their surrounding environment, plan their route, and drive with little or no involvement of human drivers. Despite the latest technological advancements and the hopeful announcements made by leading entrepreneurs, to date no personal vehicle is approved for road circulation in a “fully” or “semi ...
Xingshuai Dong +13 more
wiley +1 more source
Abstract Research Summary Firm technological research has the potential to spawn multiple applications. Despite recognizing such potential, past literature disagrees on the process through which firms discover and grow new applications out of their past technological research.
Xirong (Subrina) Shen
wiley +1 more source
Rethinking adversarial attacks on neuromorphic models
Spiking neural networks (SNN) are biologically inspired artificial neural networks that emulate the behaviour of biological neurons in spiking-based computational units.
Soukaina Aji +3 more
doaj +1 more source
A comparative study of phantom sponge for monocular 3D object detection on edge devices
In this paper, we expand the Phantom Sponge attack to monocular 3D object detection to increase false positives and detection times, thereby impairing the performance of edge devices.
Shaheer Siddiqui +2 more
doaj +1 more source

