Results 81 to 90 of about 215,342 (268)
This study introduces stVGP, a variational spatial Gaussian process framework for multi‐modal, multi‐slice spatial transcriptomics. By integrating histological and genomic data through hybrid alignment and attention‐based fusion, stVGP reconstructs coherent 3D functional landscapes.
Zedong Wang +3 more
wiley +1 more source
Adversarial training suffers from poor effectiveness due to the challenging optimisation of loss with hard labels. To address this issue, adversarial distillation has emerged as a potential solution, encouraging target models to mimic the output of the ...
Shuyi Li +3 more
doaj +1 more source
This review comprehensively summarizes the atomic defects in TMDs for their applications in sustainable energy storage devices, along with the latest progress in ML methodologies for high‐throughput TEM data analysis, offering insights on how ML‐empowered microscopy facilitates bridging structure–property correlation and inspires knowledge for precise ...
Zheng Luo +6 more
wiley +1 more source
Extractive Question Answering (EQA) models aim to locate accurate answers from passages given a question but are highly susceptible to adversarial attacks.
Gang Huang, Lu Zhang, Hailun Wang
doaj +1 more source
Engineering Immune Cell to Counteract Aging and Aging‐Associated Diseases
This review highlights a paradigm shift in which advanced immune cell therapies, initially developed for cancer, are now being harnessed to combat aging. By engineering immune cells to selectively clear senescent cells and remodel pro‐inflammatory tissue microenvironments, these strategies offer a novel and powerful approach to delay age‐related ...
Jianhua Guo +5 more
wiley +1 more source
On Adversarial Robust Generalization of DNNs for Remote Sensing Image Classification
Deep neural networks (DNNs)-based deep learning is an important technical support in the task of remote sensing image classification. But DNNs are susceptible to adversarial attacks.
Wei Xue +4 more
doaj +1 more source
Case-Aware Adversarial Training
The neural network (NN) becomes one of the most heated type of models in various signal processing applications. However, NNs are extremely vulnerable to adversarial examples (AEs). To defend AEs, adversarial training (AT) is believed to be the most effective method while due to the intensive computation, AT is limited to be applied in most ...
Fan, Mingyuan, Liu, Yang, Chen, Cen
openaire +2 more sources
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu +9 more
wiley +1 more source
Benchmarking the adversarial resilience of machine learning models for DDoS detection
Distributed Denial of Service (DDoS) attacks continue to grow in scale and sophistication, making timely and reliable detection increasingly challenging.
Harsh Dadhwal +3 more
doaj +1 more source
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source

