Tibetan Data Augmentation via GAN‐Based Handwritten Text Generation
ABSTRACT Increased awareness of Tibetan cultural preservation, along with technological advancements, has led to significant efforts in academic research on Tibetan. However, the structural complexity of the Tibetan language and limited labeled handwriting data impede advancements in Optical Character Recognition (OCR) and other applications.
Dorje Tashi +9 more
wiley +1 more source
Robust Deep Active Learning via Distance-Measured Data Mixing and Adversarial Training. [PDF]
Song S, Wang X, Dong S, Jiang J.
europepmc +1 more source
Multi‐Scale Transformer for Image Restoration
ABSTRACT Although Transformer‐based image restoration methods have demonstrated impressive performance, existing Transformers still insufficiently exploit multiscale information. Previous non‐Transformer‐based studies have shown that incorporating multiscale features is crucial for improving restoration results.
Wuzhen Shi +6 more
wiley +1 more source
From accuracy to robustness: a comparative study of five advanced large language models on the Chinese dental licensing examination. [PDF]
Zhang J +7 more
europepmc +1 more source
Towards Interpretable Face Morphing via Unsupervised Learning of Layer‐Wise and Local Features
ABSTRACT Discovering meaningful face morphing is critical for applications in image synthesis. Traditional unsupervised methods rely on global or layer‐wise representations, neglecting finer local details and thus limiting the control over specific facial attributes.
Cheng Yu, Chuan Chen, Wenmin Wang
wiley +1 more source
Neuromorphic computing paradigms enhance robustness through spiking neural networks. [PDF]
Ding J, Yu Z, Liu JK, Huang T.
europepmc +1 more source
ABSTRACT Networked control systems (NCSs) often suffer from performance degradation due to limited communication bandwidth, which can cause data transmission conflicts and packet loss. Existing scheduling strategies may fail to simultaneously meet the real‐time requirements and the importance of multisensor data, and they are particularly vulnerable ...
Da Chen +5 more
wiley +1 more source
Securing IoT Vision Systems: An Unsupervised Framework for Adversarial Example Detection Integrating Spatial Prototypes and Multidimensional Statistics. [PDF]
Wang N, Li J, Zhang C, Zhang D.
europepmc +1 more source
Hybrid framework for image forgery detection and robustness against adversarial attacks using vision transformer and SVM. [PDF]
Abdelmaksoud M +3 more
europepmc +1 more source
An incremental adversarial training method enables timeliness and rapid new knowledge acquisition. [PDF]
Ge Y, Dong Y, Sun H, Liu Y, Wang C.
europepmc +1 more source

