Adversarial Domain Adaptation for Variational Neural Language Generation in Dialogue Systems [PDF]
Van Khanh Tran, Le-Minh Nguyen
openalex +1 more source
Feature Disentangling and Combination Implemented by Spin–Orbit Torque Magnetic Tunnel Junctions
Spin–orbit torque magnetic tunnel junctions (SOT‐MTJs) enable efficient feature disentangling and integration in image data. A proposed algorithm leverages SOT‐MTJs as true random number generators to disentangle and recombine features in real time, with experimental validation on emoji and facial datasets.
Xiaohan Li +15 more
wiley +1 more source
Feature from recent image foundation models (DINOv2) are useful for vision tasks (segmentation, object localization) with little or no human input. Once upsampled, they can be used for weakly supervised micrograph segmentation, achieving strong results when compared to classical features (blurs, edge detection) across a range of material systems.
Ronan Docherty +2 more
wiley +1 more source
Multimodal deceptive adversarial architecture for C4ISR system based on large models
ZHANG Jie, SHEN Chaopeng, CHEN Jinyi, LIU Yujie, XU Haotian
openalex +2 more sources
Collaborative Multiagent Closed‐Loop Motion Planning for Multimanipulator Systems
This work presents a hierarchical multi‐manipulator planner, emphasizing highly overlapping space. The proposed method leverages an enhanced Dynamic Movement Primitive based planner along with an improvised Multi‐Agent Reinforcement Learning approach to ensure regulatory and mediatory control while ensuring low‐level autonomy. Experiments across varied
Tian Xu, Siddharth Singh, Qing Chang
wiley +1 more source
Optimized CatBoost machine learning (OCML) for DDoS detection in cloud virtual machines with time-series and adversarial robustness. [PDF]
Samy H, Bahaa-Eldin AM, Sobh MA, Taha A.
europepmc +1 more source
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems [PDF]
Tianyu Du +5 more
openalex +1 more source
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
Privacy-preserving cyberthreat detection in decentralized social media with federated cross-modal graph transformers. [PDF]
Premkumar D, Nachimuthu SK.
europepmc +1 more source
Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks [PDF]
Abhishek Gupta, Zhaoyuan Yang
openalex +1 more source

