Results 71 to 80 of about 227,956 (276)
Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS) [PDF]
Zakir Ahmad Sheikh +3 more
openalex +1 more source
SETComp, a transfer learning model based on permutation‐invariance, is pre‐trained on single‐compound intervention data and fine‐tuned on complex system (e.g., natural products) data. The model achieves up to 93.86% accuracy on complex system‐cell‐gene association predictions, outperforming the baseline by up to 27.59%.
Boyang Wang +4 more
wiley +1 more source
The adversarial principle has a long tradition in Polish civil procedure. It was one of the main principles under the Polish Civil Procedure Code of 1930.
Sławomir Marciniak
doaj +1 more source
The paper proposes that the root cause of aging is the loss of anatomical goal‐directedness after development. Using evolutionary neural cellular automata simulations, the authors show that after the organism has reached its developmental homeostatic setpoint (the adult morphology), the absence of target state to pursue leads to a drifting anatomical ...
Léo Pio‐Lopez +2 more
wiley +1 more source
Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve the performance. The adversarial attack technology makes both these models face severe challenges.
Xueshuai Gao +6 more
doaj +1 more source
Plaintiff aims in medical negligence disputes: limitations of an adversarial system. [PDF]
Tumelty ME.
europepmc +1 more source
From conventional ceramics to bioinspired smart composites, this review charts the evolution of dental restorative biomaterials. Integrating materials innovation, advanced manufacturing technologies, and bioinspired strategies, it presents a roadmap for developing functional, clinically translatable restorations that combine durability, adaptability ...
Bailei Li +14 more
wiley +1 more source
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu +5 more
doaj +1 more source
This paper introduces an innovative methodology to disrupt deep-learning (DL) surveillance systems by implementing an adversarial framework strategy, inducing misclassification in live video objects and extending attacks to real-time models.
Gyana Ranjana Panigrahi +5 more
doaj +1 more source
This study presents a novel microscopic imaging system capable of rapid, section‐free scanning of irregular tissue surfaces, delivering high sensitivity for detecting cancer cell clusters during intraoperative tumor margin assessment. Abstract Rapid and accurate intraoperative examination of tumor margins is crucial for precise surgical treatment, yet ...
Zhicheng Shao +17 more
wiley +1 more source

