Results 51 to 60 of about 22,784,147 (354)

Exploiting Frequency Characteristics for Boosting the Invisibility of Adversarial Attacks

open access: yesApplied Sciences
Mainstream transferable adversarial attacks tend to introduce noticeable artifacts into the generated adversarial examples, which will impair the invisibility of adversarial perturbation and make these attacks less practical in real-world scenarios.
Chen Li   +3 more
doaj   +1 more source

From the Discovery of the Giant Magnetocaloric Effect to the Development of High‐Power‐Density Systems

open access: yesAdvanced Materials Technologies, EarlyView.
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz   +5 more
wiley   +1 more source

Detection of Adversarial Attacks Using Deep Learning and Features Extracted From Interpretability Methods in Industrial Scenarios

open access: yesIEEE Access
The adversarial training technique has been shown to improve the robustness of Machine Learning and Deep Learning models to adversarial attacks in the Computer Vision field.
Angel Luis Perales Gomez   +3 more
doaj   +1 more source

Multiparameter Closed‐Loop Control to Advance Reliability of Aerosol Jet Printing

open access: yesAdvanced Materials Technologies, EarlyView.
A multiparameter framework for closed‐loop control of aerosol jet printing is developed to improve process consistency over both short and long timescales. By creating a control architecture responsive to the dynamic behavior of the printing system, variability in functional electrical properties is significantly reduced over extended duration printing,
Andrew J. Schwartz   +2 more
wiley   +1 more source

Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems

open access: yesMathematics
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj   +1 more source

Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space

open access: yesAdvanced Robotics Research, EarlyView.
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo   +6 more
wiley   +1 more source

Dual-Targeted Textfooler Attack on Text Classification Systems

open access: yesIEEE Access, 2023
Deep neural networks provide good performance on classification tasks such as those for image, audio, and text classification. However, such neural networks are vulnerable to adversarial examples.
Hyun Kwon
doaj   +1 more source

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System [PDF]

open access: yesAAAI Conference on Artificial Intelligence, 2019
Deep neural networks (DNNs)-powered Electrocardiogram (ECG) diagnosis systems recently achieve promising progress to take over tedious examinations by cardiologists.
Huangxun Chen   +3 more
semanticscholar   +1 more source

Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains

open access: yesAdvanced Robotics Research, EarlyView.
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao   +3 more
wiley   +1 more source

Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches

open access: yesSensors, 2021
Deep neural networks (DNNs), especially those used in computer vision, are highly vulnerable to adversarial attacks, such as adversarial perturbations and adversarial patches. Adversarial patches, often considered more appropriate for a real-world attack,
Yongsu Kim   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy