Results 161 to 170 of about 229,925 (327)
A CRDNet‐Based Watermarking Algorithm for Fused Visible–Infrared Images
CRDnet includes encoders and decoders based on residual and dense structures, a fusion network robust to 12 visible and infrared image fusion algorithms, and predictors for predicting watermarked infrared images. The encoder and decoder incorporate preprocessing steps, attention mechanisms, and activation functions suitable for infrared images.
Yu Bai +4 more
wiley +1 more source
Cardiovascular diseases are leading death causes; electrocardiogram (ECG) analysis is slow, motivating machine learning and deep learning. This study compares deep convolutional generative adversarial network, conditional GAN, and Wasserstein GAN with gradient penalty (WGAN‐GP) for synthetic ECG spectrograms; Fréchet Inception Distance (FID) and ...
Giovanny Barbosa‐Casanova +3 more
wiley +1 more source
Hybrid GNN-LSTM defense with differential privacy and secure multi-party computation for edge-optimized neuromorphic autonomous systems. [PDF]
Rekik S, Mehmood S.
europepmc +1 more source
Adversarial attack on deep learning-based dermatoscopic image recognition systems
Jérôme Allyn +4 more
openalex +1 more source
Adversarial Examples in Embedded Systems
Machine learning algorithms are used for inference and decision-making in embedded systems. Sensor data is used to train machine learning models for various smart functions of embedded and cyber-physical systems ranging from applications in healthcare and emergency response to autonomous vehicles and national security.
openaire +2 more sources
Robust Dysarthric Speech Recognition with GAN Enhancement and LLM Correction
This study tackles dysarthric speech recognition by combining generative adversarial network (GAN)‐generated synthetic data with large language model (LLM)‐based error correction. The approach integrates three key elements: an improved CycleGAN to generate synthetic dysarthric speech for data augmentation, a multimodal automatic speech recognition core
Yibo He +3 more
wiley +1 more source
Investigating vulnerabilities of gait recognition model using latent-based perturbations. [PDF]
Ali Z +5 more
europepmc +1 more source
Collaborative Multiagent Closed‐Loop Motion Planning for Multimanipulator Systems
This work presents a hierarchical multi‐manipulator planner, emphasizing highly overlapping space. The proposed method leverages an enhanced Dynamic Movement Primitive based planner along with an improvised Multi‐Agent Reinforcement Learning approach to ensure regulatory and mediatory control while ensuring low‐level autonomy. Experiments across varied
Tian Xu, Siddharth Singh, Qing Chang
wiley +1 more source

