Adversarial Robustness by One Bit Double Quantization for Visual Classification
In this paper, we propose a novel robust visual classification framework that uses double quantization (dquant) to defend against adversarial examples in a specific attack scenario called “subsequent adversarial examples” where test images ...
Maungmaung Aprilpyone +2 more
doaj +1 more source
Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters
Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed
Dang Duy Thang, Toshihiro Matsui
doaj +1 more source
Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network
Adversarial attacks have threatened the credibility of machine learning models and cast doubts over the integrity of data. The attacks have created much harm in the fields of computer vision, and natural language processing.
Zhipeng Liu +5 more
doaj +1 more source
Design of 3D Display System for Intangible Cultural Heritage Based on Generative Adversarial Network [PDF]
Jiachun Wang +3 more
openalex +1 more source
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz +5 more
wiley +1 more source
Multiparameter Closed‐Loop Control to Advance Reliability of Aerosol Jet Printing
A multiparameter framework for closed‐loop control of aerosol jet printing is developed to improve process consistency over both short and long timescales. By creating a control architecture responsive to the dynamic behavior of the printing system, variability in functional electrical properties is significantly reduced over extended duration printing,
Andrew J. Schwartz +2 more
wiley +1 more source
Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation
Adversarial examples in an image classification task cause neural networks to predict incorrect class labels with high confidence. Many applications related to image classification, such as self-driving and facial recognition, have been seriously ...
Feng Li, Xuehui Du, Liu Zhang
doaj +1 more source
Inverse Design in Nanophotonics via Representation Learning
This review frames machine learning (ML) in nanophotonics through a classification based on where ML is applied. We categorize methods as either output‐side, which create differentiable surrogates for solving Maxwell's partial differential equations (PDEs), or input‐side, which learn compact representations of device geometry.
Reza Marzban +2 more
wiley +1 more source
The Principle of Adversarial System in Canon Law and Polish Law – Outline of the Issues [PDF]
This paper attempts to describe the meaning and role of the adversarial system principle in the canon law against the background of the Polish law. The eponymous issue of the adversarial system was analysed using a comparative legal method, which makes ...
Maciej Andrzejewski
doaj +1 more source
Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo +6 more
wiley +1 more source

