Results 81 to 90 of about 24,885,017 (322)
This work presents a state‐adaptive Koopman linear quadratic regulator framework for real‐time manipulation of a deformable swab tool in robotic environmental sampling. By combining Koopman linearization, tactile sensing, and centroid‐based force regulation, the system maintains stable contact forces and high coverage across flat and inclined surfaces.
Siavash Mahmoudi +2 more
wiley +1 more source
Early Radiation Therapy Response Assessment Using Multi‐Scale Photoacoustic Imaging
Tomographic and mesoscopic photoacoustics capture intratumoural features of radioresistance and response. ABSTRACT There is a critical unmet clinical need to identify biomarkers that predict and detect radiation therapy (RT) response in cancer. Using the unique capabilities of multi‐scale photoacoustic imaging (PAI) to depict tumor oxygenation and ...
Thierry L. Lefebvre +12 more
wiley +1 more source
Adversarial Examples Identification in an End-to-End System With Image Transformation and Filters
Deep learning has been receiving great attention in recent years because of its impressive performance in many tasks. However, the widespread adoption of deep learning also becomes a major security risk for those systems as recent researches have pointed
Dang Duy Thang, Toshihiro Matsui
doaj +1 more source
This study generates high‐fidelity synthetic longitudinal records for a million‐patient diabetes cohort, successfully replicating clinical predictive performance. However, deeper analysis reveals algorithmic biases and trajectory inconsistencies that escape standard quality metrics. These findings challenge current validation norms, demonstrating why a
Francisco Ortuño +5 more
wiley +1 more source
The Principle of Adversarial System in Canon Law and Polish Law – Outline of the Issues [PDF]
This paper attempts to describe the meaning and role of the adversarial system principle in the canon law against the background of the Polish law. The eponymous issue of the adversarial system was analysed using a comparative legal method, which makes ...
Maciej Andrzejewski
doaj +1 more source
Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation
Adversarial examples in an image classification task cause neural networks to predict incorrect class labels with high confidence. Many applications related to image classification, such as self-driving and facial recognition, have been seriously ...
Feng Li, Xuehui Du, Liu Zhang
doaj +1 more source
Solid Harmonic Wavelet Bispectrum for Image Analysis
The Solid Harmonic Wavelet Bispectrum (SHWB), a rotation‐ and translation‐invariant descriptor that captures higher‐order (phase) correlations in signals, is introduced. Combining wavelet scattering, bispectral analysis, and group theory, SHWB achieves interpretable, data‐efficient representations and demonstrates competitive performance across texture,
Alex Brown +3 more
wiley +1 more source
Adversarial Samples on Android Malware Detection Systems for IoT Systems [PDF]
Many IoT (Internet of Things) systems run Android systems or Android-like systems. With the continuous development of machine learning algorithms, the learning-based Android malware detection system for IoT devices has gradually increased. However, these learning-based detection models are often vulnerable to adversarial samples.
Xiaolei Liu +5 more
openaire +7 more sources
His‐MMDM: Multi‐Domain and Multi‐Omics Translation of Histopathological Images with Diffusion Models
His‐MMDM is a diffusion model‐based framework for scalable multi‐domain and multi‐omics translation of histopathological images, enabling tasks from virtual staining, cross‐tumor knowledge transfer, and omics‐guided image editing. ABSTRACT Generative AI (GenAI) has advanced computational pathology through various image translation models.
Zhongxiao Li +13 more
wiley +1 more source
Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks
Machine learning systems based on deep neural networks, being able to produce state-of-the-art results on various perception tasks, have gained mainstream adoption in many applications.
Liu, Yannan +3 more
core +1 more source

