Results 51 to 60 of about 22,784,147 (354)
Exploiting Frequency Characteristics for Boosting the Invisibility of Adversarial Attacks
Mainstream transferable adversarial attacks tend to introduce noticeable artifacts into the generated adversarial examples, which will impair the invisibility of adversarial perturbation and make these attacks less practical in real-world scenarios.
Chen Li +3 more
doaj +1 more source
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz +5 more
wiley +1 more source
The adversarial training technique has been shown to improve the robustness of Machine Learning and Deep Learning models to adversarial attacks in the Computer Vision field.
Angel Luis Perales Gomez +3 more
doaj +1 more source
Multiparameter Closed‐Loop Control to Advance Reliability of Aerosol Jet Printing
A multiparameter framework for closed‐loop control of aerosol jet printing is developed to improve process consistency over both short and long timescales. By creating a control architecture responsive to the dynamic behavior of the printing system, variability in functional electrical properties is significantly reduced over extended duration printing,
Andrew J. Schwartz +2 more
wiley +1 more source
Deep Reinforcement Learning-Based Adversarial Attack and Defense in Industrial Control Systems
Adversarial attacks targeting industrial control systems, such as the Maroochy wastewater system attack and the Stuxnet worm attack, have caused significant damage to related facilities.
Mun-Suk Kim
doaj +1 more source
Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo +6 more
wiley +1 more source
Dual-Targeted Textfooler Attack on Text Classification Systems
Deep neural networks provide good performance on classification tasks such as those for image, audio, and text classification. However, such neural networks are vulnerable to adversarial examples.
Hyun Kwon
doaj +1 more source
ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System [PDF]
Deep neural networks (DNNs)-powered Electrocardiogram (ECG) diagnosis systems recently achieve promising progress to take over tedious examinations by cardiologists.
Huangxun Chen +3 more
semanticscholar +1 more source
Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao +3 more
wiley +1 more source
Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches
Deep neural networks (DNNs), especially those used in computer vision, are highly vulnerable to adversarial attacks, such as adversarial perturbations and adversarial patches. Adversarial patches, often considered more appropriate for a real-world attack,
Yongsu Kim +5 more
doaj +1 more source

