Results 81 to 90 of about 227,956 (276)

A CGAN-based adversarial attack method for data-driven state estimation

open access: yesInternational Journal of Electrical Power & Energy Systems
With the development of data science and technology, the data-driven algorithms under the new power system architecture provide support for real-time and accurate state estimation (SE).
Qi Wang   +5 more
doaj   +1 more source

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

Image Fusion for Super‐Resolution Mass Spectrometry Imaging of Plant Tissue

open access: yesAdvanced Science, EarlyView.
A loss controlled residual network (LCRN) workflow is developed for super‐resolution fusion of plant mass spectrometry imaging data. LCRN uses a novel edge perceptual loss metric to preserve complex plant tissue morphology. LCRN achieves up to 20‐fold magnification while effectively combining chemical information from mass spectrometry with ...
Yuchen Zou   +3 more
wiley   +1 more source

A Cost‐Effective and Scalable Machine Learning Approach for Quality Assessment of Fresh Maize Kernel Using NIR Spectroscopy

open access: yesAdvanced Science, EarlyView.
A cost‐effective and scalable PCNN approach is developed for NIR model construction that has compatibility with multiple instruments and multiple crops. It is time and cost saving, rapid and nondestructive, small sample set based, various quality properties and extensible for breeding application in fresh maize, forage maize, rice, wheat, and barley ...
Jiang Shi   +9 more
wiley   +1 more source

Research on The Security of Face Recognition Systems Based on Digital and Physical Counterattacks [PDF]

open access: yesITM Web of Conferences
Adversarial attacks have become an important direction in the research of their security by generating adversarial samples or physically interfering to deceive face recognition systems. This study compares the two methods of digital and physical attacks,
Ma Tengyan
doaj   +1 more source

SpaBalance: Balanced Learning for Efficient Spatial Multi‐Omics Decoding

open access: yesAdvanced Science, EarlyView.
SpaBalance is a computational framework that harmonizes multi‐omics learning via gradient equilibrium and dual‐stream feature decomposition, achieving superior clustering accuracy, biological interpretability, and scalable integration of three or more spatial omics modalities.
Yingbo Cui   +8 more
wiley   +1 more source

QuEst: Adversarial Attack Intensity Estimation via Query Response Analysis

open access: yesMathematics
Deep learning has dramatically advanced computer vision tasks, including person re-identification (re-ID), substantially improving matching individuals across diverse camera views.
Eun Gi Lee, Chi Hyeok Min, Seok Bong Yoo
doaj   +1 more source

Harnessing Time‐Dependent Magnetic Texture Dynamics via Spin‐Orbit Torque for Physics‐Enhanced Neuromorphic Computing

open access: yesAdvanced Science, EarlyView.
A neuromorphic computing platform using spin‐orbit torque‐controlled magnetic textures is reported. The device implements bio‐inspired synaptic functions and achieves high performance in both pattern recognition (>93%) and combinatorial optimization (>95%), enabling unified processing of cognitive and optimization tasks.
Yifan Zhang   +13 more
wiley   +1 more source

xAI-GAN: Enhancing Generative Adversarial Networks via Explainable AI Systems [PDF]

open access: green, 2020
Vineel Nagisetty   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy