Results 81 to 90 of about 215,342 (268)

Reconstructing Coherent Functional Landscape From Multi‐Modal Multi‐Slice Spatial Transcriptomics by a Variational Spatial Gaussian Process

open access: yesAdvanced Science, EarlyView.
This study introduces stVGP, a variational spatial Gaussian process framework for multi‐modal, multi‐slice spatial transcriptomics. By integrating histological and genomic data through hybrid alignment and attention‐based fusion, stVGP reconstructs coherent 3D functional landscapes.
Zedong Wang   +3 more
wiley   +1 more source

Clean, performance‐robust, and performance‐sensitive historical information based adversarial self‐distillation

open access: yesIET Computer Vision
Adversarial training suffers from poor effectiveness due to the challenging optimisation of loss with hard labels. To address this issue, adversarial distillation has emerged as a potential solution, encouraging target models to mimic the output of the ...
Shuyi Li   +3 more
doaj   +1 more source

Atomic Defects in Layered Transition Metal Dichalcogenides for Sustainable Energy Storage and the Intelligent Trends in Data Analytics

open access: yesAdvanced Science, EarlyView.
This review comprehensively summarizes the atomic defects in TMDs for their applications in sustainable energy storage devices, along with the latest progress in ML methodologies for high‐throughput TEM data analysis, offering insights on how ML‐empowered microscopy facilitates bridging structure–property correlation and inspires knowledge for precise ...
Zheng Luo   +6 more
wiley   +1 more source

Improving model adversarial robustness in Extractive Question Answering via Wasserstein-Guided feature Representations

open access: yesAlexandria Engineering Journal
Extractive Question Answering (EQA) models aim to locate accurate answers from passages given a question but are highly susceptible to adversarial attacks.
Gang Huang, Lu Zhang, Hailun Wang
doaj   +1 more source

Engineering Immune Cell to Counteract Aging and Aging‐Associated Diseases

open access: yesAdvanced Science, EarlyView.
This review highlights a paradigm shift in which advanced immune cell therapies, initially developed for cancer, are now being harnessed to combat aging. By engineering immune cells to selectively clear senescent cells and remodel pro‐inflammatory tissue microenvironments, these strategies offer a novel and powerful approach to delay age‐related ...
Jianhua Guo   +5 more
wiley   +1 more source

On Adversarial Robust Generalization of DNNs for Remote Sensing Image Classification

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Deep neural networks (DNNs)-based deep learning is an important technical support in the task of remote sensing image classification. But DNNs are susceptible to adversarial attacks.
Wei Xue   +4 more
doaj   +1 more source

Case-Aware Adversarial Training

open access: yes, 2022
The neural network (NN) becomes one of the most heated type of models in various signal processing applications. However, NNs are extremely vulnerable to adversarial examples (AEs). To defend AEs, adversarial training (AT) is believed to be the most effective method while due to the intensive computation, AT is limited to be applied in most ...
Fan, Mingyuan, Liu, Yang, Chen, Cen
openaire   +2 more sources

Urea‐Formaldehyde Resin Confined Silicon Nanodots Composites: High‐Performance and Ultralong Persistent Luminescence for Dynamic AI Information Encryption

open access: yesAdvanced Science, EarlyView.
Schematic illustration of SiNDs composite materials synthesis and its internal photophysical process mechanism. And an AI‐assisted dynamic information encryption process. ABSTRACT Persistent luminescence materials typically encounter an intrinsic trade‐off between high phosphorescence quantum yield (PhQY) and ultralong phosphorescence lifetime.
Yulu Liu   +9 more
wiley   +1 more source

Benchmarking the adversarial resilience of machine learning models for DDoS detection

open access: yesArray
Distributed Denial of Service (DDoS) attacks continue to grow in scale and sophistication, making timely and reliable detection increasingly challenging.
Harsh Dadhwal   +3 more
doaj   +1 more source

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy