Results 41 to 50 of about 240,849 (326)

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

From the Discovery of the Giant Magnetocaloric Effect to the Development of High‐Power‐Density Systems

open access: yesAdvanced Materials Technologies, EarlyView.
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz   +5 more
wiley   +1 more source

Exploiting Frequency Characteristics for Boosting the Invisibility of Adversarial Attacks

open access: yesApplied Sciences
Mainstream transferable adversarial attacks tend to introduce noticeable artifacts into the generated adversarial examples, which will impair the invisibility of adversarial perturbation and make these attacks less practical in real-world scenarios.
Chen Li   +3 more
doaj   +1 more source

Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML

open access: yesComputers, 2022
Intrusion detection systems (IDS) are a very vital part of network security, as they can be used to protect the network from illegal intrusions and communications.
Shahad Alahmed   +4 more
doaj   +1 more source

Adversarial Transferability in Wearable Sensor Systems

open access: yesCoRR, 2020
Machine learning is used for inference and decision making in wearable sensor systems. However, recent studies have found that machine learning algorithms are easily fooled by the addition of adversarial perturbations to their inputs. What is more interesting is that adversarial examples generated for one machine learning system is also effective ...
Ramesh Kumar Sah   +1 more
openaire   +2 more sources

Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space

open access: yesAdvanced Robotics Research, EarlyView.
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo   +6 more
wiley   +1 more source

Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios

open access: yesIEEE Access
The adversarial training technique has been shown to improve the robustness of Machine Learning and Deep Learning models to adversarial attacks in the Computer Vision field.
Angel Luis Perales Gomez   +3 more
doaj   +1 more source

Adversarial Robustness: Softmax versus Openmax

open access: yes, 2017
Deep neural networks (DNNs) provide state-of-the-art results on various tasks and are widely used in real world applications. However, it was discovered that machine learning models, including the best performing DNNs, suffer from a fundamental problem ...
Boult, Terrance E.   +2 more
core   +1 more source

Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains

open access: yesAdvanced Robotics Research, EarlyView.
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao   +3 more
wiley   +1 more source

Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems

open access: yesMathematics
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj   +1 more source

Home - About - Disclaimer - Privacy