Results 51 to 60 of about 24,885,017 (322)

Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning

open access: yesApplied Sciences, 2022
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constantly explore new ways to attack cyberinfrastructure. Recently, the use of deep learning-based intrusion detection systems has been on the rise. This rise is
Kudzai Sauka   +3 more
doaj   +1 more source

Physical Layer Communications System Design Over-the-Air Using Adversarial Networks [PDF]

open access: yesEuropean Signal Processing Conference, 2018
This paper presents a novel method for synthesizing new physical layer modulation and coding schemes for communications systems using a learning-based approach which does not require an analytic model of the impairments in the channel.
Tim O'Shea   +3 more
semanticscholar   +1 more source

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

On Adversarial Patches: Real-World Attack on ArcFace-100 Face Recognition System [PDF]

open access: yesIEEE Region International Conference on Computational Technologies in Electrical and Electronics Engineering, 2019
Recent works showed the vulnerability of image classifiers to adversarial attacks in the digital domain. However, the majority of attacks involve adding small perturbation to an image to fool the classifier. Unfortunately, such procedures can not be used
Mikhail Aleksandrovich Pautov   +4 more
semanticscholar   +1 more source

Computational Modeling Meets 3D Bioprinting: Emerging Synergies in Cardiovascular Disease Modeling

open access: yesAdvanced Healthcare Materials, EarlyView.
Emerging advances in three‐dimensional bioprinting and computational modeling are reshaping cardiovascular (CV) research by enabling more realistic, patient‐specific tissue platforms. This review surveys cutting‐edge approaches that merge biomimetic CV constructs with computational simulations to overcome the limitations of traditional models, improve ...
Tanmay Mukherjee   +7 more
wiley   +1 more source

Self‐Assembled Monolayers in p–i–n Perovskite Solar Cells: Molecular Design, Interfacial Engineering, and Machine Learning–Accelerated Material Discovery

open access: yesAdvanced Materials, EarlyView.
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley   +1 more source

Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML

open access: yesComputers, 2022
Intrusion detection systems (IDS) are a very vital part of network security, as they can be used to protect the network from illegal intrusions and communications.
Shahad Alahmed   +4 more
doaj   +1 more source

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

Exploiting Frequency Characteristics for Boosting the Invisibility of Adversarial Attacks

open access: yesApplied Sciences
Mainstream transferable adversarial attacks tend to introduce noticeable artifacts into the generated adversarial examples, which will impair the invisibility of adversarial perturbation and make these attacks less practical in real-world scenarios.
Chen Li   +3 more
doaj   +1 more source

Adversarial Robustness: Softmax versus Openmax

open access: yes, 2017
Deep neural networks (DNNs) provide state-of-the-art results on various tasks and are widely used in real world applications. However, it was discovered that machine learning models, including the best performing DNNs, suffer from a fundamental problem ...
Boult, Terrance E.   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy