Results 51 to 60 of about 227,956 (276)

Adversarial Robustness by One Bit Double Quantization for Visual Classification

open access: yesIEEE Access, 2019
In this paper, we propose a novel robust visual classification framework that uses double quantization (dquant) to defend against adversarial examples in a specific attack scenario called “subsequent adversarial examples” where test images ...
Maungmaung Aprilpyone   +2 more
doaj   +1 more source

Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters

open access: yesIEEE Access, 2020
Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed
Dang Duy Thang, Toshihiro Matsui
doaj   +1 more source

Anomaly-Based Intrusion on IoT Networks Using AIGAN-a Generative Adversarial Network

open access: yesIEEE Access, 2023
Adversarial attacks have threatened the credibility of machine learning models and cast doubts over the integrity of data. The attacks have created much harm in the fields of computer vision, and natural language processing.
Zhipeng Liu   +5 more
doaj   +1 more source

From the Discovery of the Giant Magnetocaloric Effect to the Development of High‐Power‐Density Systems

open access: yesAdvanced Materials Technologies, EarlyView.
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz   +5 more
wiley   +1 more source

Multiparameter Closed‐Loop Control to Advance Reliability of Aerosol Jet Printing

open access: yesAdvanced Materials Technologies, EarlyView.
A multiparameter framework for closed‐loop control of aerosol jet printing is developed to improve process consistency over both short and long timescales. By creating a control architecture responsive to the dynamic behavior of the printing system, variability in functional electrical properties is significantly reduced over extended duration printing,
Andrew J. Schwartz   +2 more
wiley   +1 more source

Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation

open access: yesDiscrete Dynamics in Nature and Society, 2022
Adversarial examples in an image classification task cause neural networks to predict incorrect class labels with high confidence. Many applications related to image classification, such as self-driving and facial recognition, have been seriously ...
Feng Li, Xuehui Du, Liu Zhang
doaj   +1 more source

Inverse Design in Nanophotonics via Representation Learning

open access: yesAdvanced Optical Materials, EarlyView.
This review frames machine learning (ML) in nanophotonics through a classification based on where ML is applied. We categorize methods as either output‐side, which create differentiable surrogates for solving Maxwell's partial differential equations (PDEs), or input‐side, which learn compact representations of device geometry.
Reza Marzban   +2 more
wiley   +1 more source

The Principle of Adversarial System in Canon Law and Polish Law – Outline of the Issues [PDF]

open access: yesSocietas et Iurisprudentia
This paper attempts to describe the meaning and role of the adversarial system principle in the canon law against the background of the Polish law. The eponymous issue of the adversarial system was analysed using a comparative legal method, which makes ...
Maciej Andrzejewski
doaj   +1 more source

Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space

open access: yesAdvanced Robotics Research, EarlyView.
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo   +6 more
wiley   +1 more source

Home - About - Disclaimer - Privacy