Results 21 to 30 of about 221,728 (275)

Practical Attacks Against Graph-based Clustering

open access: yes, 2017
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich   +19 more
core   +1 more source

Advanced Cellulose‐Based Gels for Wearable Physiological Monitoring: From Fiber Modification to Application Optimization

open access: yesAdvanced Functional Materials, EarlyView.
This review discusses cellulose‐based hydrogels technology, analyzes their application progress in physiological signal monitoring, and explores the effects of pretreatment, crosslinking, and molding methods on gel performance, to provide valuable insights into the efficient utilization of plant fibers and the environmentally friendly development of ...
Zhiming Wang   +8 more
wiley   +1 more source

Balancing fairness to victims, society and defendants in the cross-examination of vulnerable witnesses: an impossible triangulation? [PDF]

open access: yes, 2014
This article argues that direct cross-examination of vulnerable witnesses should be removed from Australian trials, to reduce any illegitimate advantage to the defendant.
David Plater   +2 more
core  

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

open access: yes, 2017
While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication
Kantardzic, Mehmed, Sethi, Tegjyot Singh
core   +1 more source

Photonic Nanomaterials for Wearable Health Solutions

open access: yesAdvanced Materials, EarlyView.
This review discusses the fundamentals and applications of photonic nanomaterials in wearable health technologies. It covers light‐matter interactions, synthesis, and functionalization strategies, device assembly, and sensing capabilities. Applications include skin patches and contact lenses for diagnostics and therapy. Future perspectives emphasize AI‐
Taewoong Park   +3 more
wiley   +1 more source

Attentive Adversarial Learning for Domain-Invariant Training

open access: yes, 2019
Adversarial domain-invariant training (ADIT) proves to be effective in suppressing the effects of domain variability in acoustic modeling and has led to improved performance in automatic speech recognition (ASR).
Gong, Yifan, Li, Jinyu, Meng, Zhong
core   +1 more source

Multifunctional Bamboo Based Materials Empowered by Multiscale Hierarchical Structures—A Critical Review

open access: yesAdvanced Materials, EarlyView.
This review summarizes the latest progress in transforming renewable bamboo resources into high‐value functional materials. It emphasizes how to leverage bamboo's multiscale hierarchical structures to realize innovative applications in energy, construction, environment, and medicine, providing key insights for developing high‐performance bio‐based ...
Yuxiang Huang   +13 more
wiley   +1 more source

Adversarial Samples on Android Malware Detection Systems for IoT Systems [PDF]

open access: yesSensors, 2019
Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these learning-based detection models are often vulnerable to adversarial samples.
Xiaolei Liu   +5 more
openaire   +8 more sources

Artificial Intelligence‐Driven Nanoarchitectonics for Smart Targeted Drug Delivery

open access: yesAdvanced Materials, EarlyView.
This perspective introduces an artificial intelligence (AI)‐driven nanoarchitectonics framework for targeted drug delivery, combining database‐guided nanocarrier design, machine learning (ML)‐assisted surface engineering with a designed targeting system, and in silico modeling for dynamic optimization.
Hayeon Bae   +6 more
wiley   +1 more source

Validating for Liveness in Hidden Adversary Systems

open access: yesElectronic Notes in Theoretical Computer Science, 2008
AbstractMulti-stream interactive systems can be seen as “hidden adversary” systems (HAS), where the observable behaviour on any interaction channel is affected by interactions happening on other channels. One way of modelling HAS is in the form of a multi-process I/O automata, where each interacting process appears as a token in a shared state space ...
Saikat Mukherjee   +2 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy