Results 131 to 140 of about 24,885,017 (322)

Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems

open access: yesBig Data and Cognitive Computing
Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate ...
Meaad Ahmed   +3 more
doaj   +1 more source

A Review on Recent Trends of Bioinspired Soft Robotics: Actuators, Control Methods, Materials Selection, Sensors, Challenges, and Future Prospects

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
This article reviews the current state of bioinspired soft robotics. The article discusses soft actuators, soft sensors, materials selection, and control methods used in bioinspired soft robotics. It also highlights the challenges and future prospects of this field.
Abhirup Sarker   +2 more
wiley   +1 more source

Large Language Model‐Based Chatbots in Higher Education

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci   +4 more
wiley   +1 more source

Predicting Performance of Hall Effect Ion Source Using Machine Learning

open access: yesAdvanced Intelligent Systems, Volume 7, Issue 3, March 2025.
This study introduces HallNN, a machine learning tool for predicting Hall effect ion source performance using a neural network ensemble trained on data generated from numerical simulations. HallNN provides faster and more accurate predictions than numerical methods and traditional scaling laws, making it valuable for designing and optimizing Hall ...
Jaehong Park   +8 more
wiley   +1 more source

Adversarial Attacks to Classification Systems

open access: yes, 2022
Amostras adversariais são inputs corrompidos com perturbações pouco visíveis, que são classificadas incorretamente por um determinado modelo alvo. Adversários criam amostras adversariais a partir de vários métodos que dependem da informação disponível sobre o sistema alvo. Num cenário white-box, os adversários tem acesso completo ao modelo enquanto que,
openaire   +1 more source

Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing

open access: yesAdvanced Intelligent Systems, EarlyView.
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian   +37 more
wiley   +1 more source

Adversarial detection based on feature invariant in license plate recognition systems

open access: yes网络与信息安全学报
Deep neural networks have become an integral part of people's daily lives. However, researchers observed that these networks were susceptible to threats from adversarial samples, leading to abnormal behaviors such as misclassification by the network ...
ZHU Xiaoyu   +4 more
doaj  

BMPCQA: Bioinspired Metaverse Point Cloud Quality Assessment Based on Large Multimodal Models

open access: yesAdvanced Intelligent Systems, EarlyView.
This study presents a bioinspired metaverse point cloud quality assessment metric, which simulates the human visual evaluation process to perform the point cloud quality assessment task. It first extracts rendering projection video features, normal image features, and point cloud patch features, which are then fed into a large multimodal model to ...
Huiyu Duan   +7 more
wiley   +1 more source

The Inquisitorial History of the Criminal Practice in Taiwan

open access: yesIustinianus Primus Law Review, 2012
Taiwan adopted the exclusionary rule and the hearsay rule in 2003. Since the criminal justice system is quite adversarial and accusatorial under the 2003 amendments, it is interesting to locate what it looked like before 2003, which might explain why
Ming-woei Chang
doaj  

Home - About - Disclaimer - Privacy