Results 81 to 90 of about 240,849 (326)

Adversary or Friend? An adversarial Approach to Improving Recommender Systems

open access: yesProceedings of the 16th ACM Conference on Recommender Systems, 2022
Pannaga Shivaswamy   +1 more
openaire   +1 more source

From Label‐Free Multiphoton Imaging to Pathological Reports: A Vision‐Language Breast Cancer Margin Pathological Diagnosis System

open access: yesAdvanced Science, EarlyView.
MarginPath is a novel vision‐language system that automates breast cancer margin assessment using a single label‐free multiphoton microscopy image. By integrating tumor‐associated collagen signatures with virtual H&E imaging, it generates accurate margin heatmaps and comprehensive diagnostic reports.
Shu Wang   +15 more
wiley   +1 more source

A Security Study of Multimodel Artificial Intelligence System: Adaptive Retention Attack for Object Detection System with Multifocus Image Fusion Model

open access: yesAdvanced Intelligent Systems
Image preprocessing models are usually employed as the preceding operations of high‐level vision tasks to improve the performance. The adversarial attack technology makes both these models face severe challenges.
Xueshuai Gao   +6 more
doaj   +1 more source

PlantGFM: A Genomic Foundation Model for Discovery and Creation of Plant Genes

open access: yesAdvanced Science, EarlyView.
A plant genomic foundation model pre‐trained on 12 species enables both accurate gene prediction and de novo gene design. Through AI‐human knowledge screening, seven designed sequences showed transcriptional activity in plants, with two expressing stable proteins—demonstrating the first DNA‐RNA‐protein expression of LLM‐generated genes in plants and ...
Changhao Li   +10 more
wiley   +1 more source

A knowledge distillation strategy for enhancing the adversarial robustness of lightweight automatic modulation classification models

open access: yesIET Communications
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu   +5 more
doaj   +1 more source

A CGAN-based adversarial attack method for data-driven state estimation

open access: yesInternational Journal of Electrical Power & Energy Systems
With the development of data science and technology, the data-driven algorithms under the new power system architecture provide support for real-time and accurate state estimation (SE).
Qi Wang   +5 more
doaj   +1 more source

The adversarial principle, the evolution and current shape of civil procedure – outline of subject matter

open access: yesPrzegląd Prawniczy Uniwersytetu im. Adama Mickiewicza, 2013
The adversarial principle has a long tradition in Polish civil procedure. It was one of the main principles under the Polish Civil Procedure Code of 1930.
Sławomir Marciniak
doaj   +1 more source

Adversarial Detection with a Dynamically Stable System

open access: yesCoRR
Adversarial detection is designed to identify and reject maliciously crafted adversarial examples(AEs) which are generated to disrupt the classification of target models. Presently, various input transformation-based methods have been developed on adversarial example detection, which typically rely on empirical experience and lead to unreliability ...
Xiaowei Long   +2 more
openaire   +2 more sources

Machine Learning Interatomic Potentials for Energy Materials: Architectures, Training Strategies, and Applications

open access: yesAdvanced Energy Materials, EarlyView.
Machine learning interatomic potentials bridge quantum accuracy and computational efficiency for materials discovery. Architectures from Gaussian process regression to equivariant graph neural networks, training strategies including active learning and foundation models, and applications in solid‐state electrolytes, batteries, electrocatalysts ...
In Kee Park   +19 more
wiley   +1 more source

Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation

open access: yesIEEE Access
This paper introduces an innovative methodology to disrupt deep-learning (DL) surveillance systems by implementing an adversarial framework strategy, inducing misclassification in live video objects and extending attacks to real-time models.
Gyana Ranjana Panigrahi   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy