Results 141 to 150 of about 219,753 (266)
A Gradual Adversarial Training Method for Semantic Segmentation
Deep neural networks (DNNs) have achieved great success in various computer vision tasks. However, they are susceptible to artificially designed adversarial perturbations, which limit their deployment in security-critical applications.
Yinkai Zan, Pingping Lu, Tingyu Meng
doaj +1 more source
Feature separation and adversarial training for the patient-independent detection of epileptic seizures. [PDF]
Yang Y +5 more
europepmc +1 more source
Four decades of retinal vessel segmentation research (1982–2025) are synthesized, spanning classical image processing, machine learning, and deep learning paradigms. A meta‐analysis of 428 studies establishes a unified taxonomy and highlights performance trends, generalization capabilities, and clinical relevance.
Avinash Bansal +6 more
wiley +1 more source
Between-Class Adversarial Training for Improving Adversarial Robustness of Image Classification. [PDF]
Wang D, Jin W, Wu Y.
europepmc +1 more source
This study presents a novel framework that enhances the reliability of DNS traffic monitoring using a hybrid long short‐term memory‐deep neural network (LSMT‐DNN) architecture, enabling robust detection of adversarial DNS tunneling. The proposed framework leverages feature extraction from DNS traffic patterns, including domain request sequences, query ...
Ahmad Almadhor +5 more
wiley +1 more source
An adversarial training framework for mitigating algorithmic biases in clinical machine learning. [PDF]
Yang J +4 more
europepmc +1 more source
This paper presents a high‐speed object pose estimation method that deconstructs objects into geometric components. Inspired by human cognitive generalization, it detects these primitives and infers the 6D pose from their stable spatial configuration.
Xuyang Li +6 more
wiley +1 more source
Privacy-Aware Early Detection of COVID-19 Through Adversarial Training. [PDF]
Rohanian O +6 more
europepmc +1 more source
OntoLogX is an autonomous AI agent that uses large language models to transform unstructured cyber security logs into ontology grounded knowledge graphs. By integrating retrieval augmented generation, iterative correction, and a light‐weight log ontology, OntoLogX produces semantically consistent intelligence that links raw log events to MITRE ATT & CK
Luca Cotti +4 more
wiley +1 more source
Named entity recognition for Chinese based on global pointer and adversarial training. [PDF]
Li H, Cheng M, Yang Z, Yang L, Chua Y.
europepmc +1 more source

