Results 91 to 100 of about 22,784,147 (354)
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu +5 more
doaj +1 more source
This paper introduces an innovative methodology to disrupt deep-learning (DL) surveillance systems by implementing an adversarial framework strategy, inducing misclassification in live video objects and extending attacks to real-time models.
Gyana Ranjana Panigrahi +5 more
doaj +1 more source
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems [PDF]
Jiaxi Tang, Hongyi Wen, Ke Wang
openalex +1 more source
Stabilizing switched linear systems under adversarial switching
The problem of stabilizing discrete-time switched linear control systems using continuous input by the user and against adversarial switching by an adversary is studied. It is assumed that the adversary has the advantage in that at each time it knows the user's decision on the continuous control input but not vice versa.
Hu, Jianghai +2 more
openaire +3 more sources
This review comprehensively summarizes the atomic defects in TMDs for their applications in sustainable energy storage devices, along with the latest progress in ML methodologies for high‐throughput TEM data analysis, offering insights on how ML‐empowered microscopy facilitates bridging structure–property correlation and inspires knowledge for precise ...
Zheng Luo +6 more
wiley +1 more source
A CGAN-based adversarial attack method for data-driven state estimation
With the development of data science and technology, the data-driven algorithms under the new power system architecture provide support for real-time and accurate state estimation (SE).
Qi Wang +5 more
doaj +1 more source
Engineering Immune Cell to Counteract Aging and Aging‐Associated Diseases
This review highlights a paradigm shift in which advanced immune cell therapies, initially developed for cancer, are now being harnessed to combat aging. By engineering immune cells to selectively clear senescent cells and remodel pro‐inflammatory tissue microenvironments, these strategies offer a novel and powerful approach to delay age‐related ...
Jianhua Guo +5 more
wiley +1 more source
Lithium‐ion battery degradation arises from complex, localized processes during operation, limiting long‐term performance. In situ electrochemical liquid cell TEM provides unique access to these mechanisms. This review summarizes degradation phenomena revealed by liquid cell TEM, traces the evolution of the three main cell designs, compares their ...
Walid Dachraoui, Rolf Erni
wiley +1 more source
Research on The Security of Face Recognition Systems Based on Digital and Physical Counterattacks [PDF]
Adversarial attacks have become an important direction in the research of their security by generating adversarial samples or physically interfering to deceive face recognition systems. This study compares the two methods of digital and physical attacks,
Ma Tengyan
doaj +1 more source
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu +9 more
wiley +1 more source

