FortiNIDS: Defending Smart City IoT Infrastructures Against Transferable Adversarial Poisoning in Machine Learning-Based Intrusion Detection Systems. [PDF]
Alajaji A.
europepmc +1 more source
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
Tianyu Du +5 more
openalex +2 more sources
AI‐Driven Microphysiological Systems for Advancing Nanoparticle Therapeutics
This review outlines recent advances in integrating artificial intelligence with microphysiological systems for nanoparticle evaluation. It highlights data‐driven optimization, image‐based prediction, and AI‐enabled analysis frameworks that advance translational research and support the development of personalized nanomedicine. Nanoparticles (NPs) play
Yedam Lee +3 more
wiley +1 more source
ConvNet-Generated Adversarial Perturbations for Evaluating 3D Object Detection Robustness. [PDF]
Abraha TM +4 more
europepmc +1 more source
Adversarial Attacks on GMM i-vector based Speaker Verification Systems
Xu Li +5 more
openalex +2 more sources
Coverage Guided Differential Adversarial Testing of Deep Learning Systems
Jianmin Guo +3 more
openalex +2 more sources
Mainstream Artificial Intelligence Technologies in Contemporary Ophthalmology
This review explores the latest artificial intelligence (AI) technologies in ophthalmology, focusing on four key data types: medical imaging, electronic health records, robotic‐assisted surgery, and genomics. It examines the structural features, use cases, clinical goals, and evaluation metrics of various AI algorithms, while also introducing emerging ...
Shiqi Yin +9 more
wiley +1 more source
Collaborative penetration testing suite for emerging generative AI algorithms. [PDF]
Radanliev P.
europepmc +1 more source
The integration of foundation models into computational microscopy revolutionizes biomedical research by enhancing imaging resolution, accelerating data analysis, and enabling real‐time biological interpretation. This systematic review critically examines recent advancements, highlights translational challenges, and discusses the transformative ...
Di Ding +5 more
wiley +1 more source
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies. [PDF]
Kilany S, Mahfouz A.
europepmc +1 more source

