Results 271 to 280 of about 2,268,403 (339)
Bearing Anomaly Detection Method Based on Multimodal Fusion and Self-Adversarial Learning. [PDF]
Liu H, Qin Y, Tu D.
europepmc +1 more source
Integrating multimodal data and machine learning for entrepreneurship research
Abstract Research Summary Extant research in neuroscience suggests that human perception is multimodal in nature—we model the world integrating diverse data sources such as sound, images, taste, and smell. Working in a dynamic environment, entrepreneurs are expected to draw on multimodal inputs in their decision making.
Yash Raj Shrestha, Vivianna Fang He
wiley +1 more source
CCIW: Cover-Concealed Image Watermarking for Dual Protection of Privacy and Copyright. [PDF]
Li R, Wang S, Li M, Ren H.
europepmc +1 more source
Abstract Research Summary Firm technological research has the potential to spawn multiple applications. Despite recognizing such potential, past literature disagrees on the process through which firms discover and grow new applications out of their past technological research.
Xirong (Subrina) Shen
wiley +1 more source
SecuFL-IoT: an adaptive privacy-preserving federated learning framework for anomaly detection in smart industrial networks. [PDF]
Alqazzaz A.
europepmc +1 more source
Lifecycle‐Based Governance to Build Reliable Ethical AI Systems
ABSTRACT Artificial intelligence (AI) systems represent a paradigm shift in technological capabilities, offering transformative potential across industries while introducing novel governance and implementation challenges. This paper presents a comprehensive framework for understanding AI systems through three critical dimensions: trustworthiness ...
Maikel Leon
wiley +1 more source
Detecting anti-forensic deepfakes with identity-aware multi-branch networks. [PDF]
Zhu M, Long J.
europepmc +1 more source
Mission Aware Cyber‐Physical Security
ABSTRACT Perimeter cybersecurity, while essential, has proven insufficient against sophisticated, coordinated, and cyber‐physical attacks. In contrast, mission‐centric cybersecurity emphasizes finding evidence of attack impact on mission success, allowing for targeted resource allocation to mitigate vulnerabilities and protect critical assets.
Georgios Bakirtzis +3 more
wiley +1 more source
Hybrid GNN-LSTM defense with differential privacy and secure multi-party computation for edge-optimized neuromorphic autonomous systems. [PDF]
Rekik S, Mehmood S.
europepmc +1 more source

