Results 131 to 140 of about 24,885,017 (322)
Re-Evaluating Deep Learning Attacks and Defenses in Cybersecurity Systems
Cybersecurity attacks pose a significant threat to the security of network systems through intrusions and illegal communications. Measuring the vulnerability of cybersecurity is crucial for refining the overall system security to further mitigate ...
Meaad Ahmed +3 more
doaj +1 more source
This article reviews the current state of bioinspired soft robotics. The article discusses soft actuators, soft sensors, materials selection, and control methods used in bioinspired soft robotics. It also highlights the challenges and future prospects of this field.
Abhirup Sarker +2 more
wiley +1 more source
Large Language Model‐Based Chatbots in Higher Education
The use of large language models (LLMs) in higher education can facilitate personalized learning experiences, advance asynchronized learning, and support instructors, students, and researchers across diverse fields. The development of regulations and guidelines that address ethical and legal issues is essential to ensure safe and responsible adaptation
Defne Yigci +4 more
wiley +1 more source
Predicting Performance of Hall Effect Ion Source Using Machine Learning
This study introduces HallNN, a machine learning tool for predicting Hall effect ion source performance using a neural network ensemble trained on data generated from numerical simulations. HallNN provides faster and more accurate predictions than numerical methods and traditional scaling laws, making it valuable for designing and optimizing Hall ...
Jaehong Park +8 more
wiley +1 more source
Adversarial Attacks to Classification Systems
Amostras adversariais são inputs corrompidos com perturbações pouco visíveis, que são classificadas incorretamente por um determinado modelo alvo. Adversários criam amostras adversariais a partir de vários métodos que dependem da informação disponível sobre o sistema alvo. Num cenário white-box, os adversários tem acesso completo ao modelo enquanto que,
openaire +1 more source
Roadmap on Artificial Intelligence‐Augmented Additive Manufacturing
This Roadmap outlines the transformative role of artificial intelligence‐augmented additive manufacturing, highlighting advances in design, monitoring, and product development. By integrating tools such as generative design, computer vision, digital twins, and closed‐loop control, it presents pathways toward smart, scalable, and autonomous additive ...
Ali Zolfagharian +37 more
wiley +1 more source
Adversarial detection based on feature invariant in license plate recognition systems
Deep neural networks have become an integral part of people's daily lives. However, researchers observed that these networks were susceptible to threats from adversarial samples, leading to abnormal behaviors such as misclassification by the network ...
ZHU Xiaoyu +4 more
doaj
BMPCQA: Bioinspired Metaverse Point Cloud Quality Assessment Based on Large Multimodal Models
This study presents a bioinspired metaverse point cloud quality assessment metric, which simulates the human visual evaluation process to perform the point cloud quality assessment task. It first extracts rendering projection video features, normal image features, and point cloud patch features, which are then fed into a large multimodal model to ...
Huiyu Duan +7 more
wiley +1 more source
The Inquisitorial History of the Criminal Practice in Taiwan
Taiwan adopted the exclusionary rule and the hearsay rule in 2003. Since the criminal justice system is quite adversarial and accusatorial under the 2003 amendments, it is interesting to locate what it looked like before 2003, which might explain why
Ming-woei Chang
doaj

