Results 31 to 40 of about 504,342 (225)
MeshAdv: Adversarial Meshes for Visual Recognition
Highly expressive models such as deep neural networks (DNNs) have been widely applied to various applications. However, recent studies show that DNNs are vulnerable to adversarial examples, which are carefully crafted inputs aiming to mislead the ...
Deng, Jia +4 more
core +1 more source
Effective Black Box Adversarial Attack with Handcrafted Kernels
We propose a new, simple framework for crafting adversarial examples for black box attacks. The idea is to simulate the substitution model with a non-trainable model compounded of just one layer of handcrafted convolutional kernels and then train the generator neural network to maximize the distance of the outputs for the original and generated ...
Petr Dvorácek +2 more
openaire +2 more sources
Pre‐analytical handling critically determines liquid biopsy performance. This study defines practical best‐practice conditions for cell‐free DNA (cfDNA) and extracellular vesicle–derived DNA (evDNA), showing how processing time, storage conditions, tube type, and plasma input volume affect DNA integrity and mutation detection.
Jonas Dohmen +11 more
wiley +1 more source
Glioma cells mainly express the endothelin receptor EDNRB, while EDNRA is restricted to a perivascular tumor subpopulation. Endothelin signaling reduces glioma cell proliferation while promoting migration and a proneural‐to‐mesenchymal transition associated with poor prognosis. This pathway activates Ca2+, K+, ERK, and STAT3 signalings and is regulated
Donovan Pineau +36 more
wiley +1 more source
dUTPases are involved in balancing the appropriate nucleotide pools. We showed that dUTPase is essential for normal development in zebrafish. The different zebrafish genomes contain several single‐nucleotide variations (SNPs) of the dut gene. One of the dUTPase variants displayed drastically lower protein stability and catalytic efficiency as compared ...
Viktória Perey‐Simon +6 more
wiley +1 more source
Black-Box Attack on Network Intrusion Detection Systems [PDF]
Na síťovou bezpečnost lze nahlížet jako na dlouhotrvající závod ve zbrojení mezi útočníky a tvůrci detektorů síťovych útoků, ve kterém se obě strany snaží dosáhnout svých cílů reagováním na akce svých protivníků.
Hroššo Peter
core
Boosting Black-Box Adversarial Attacks with Meta Learning
Deep neural networks (DNNs) have achieved remarkable success in diverse fields. However, it has been demonstrated that DNNs are very vulnerable to adversarial examples even in black-box settings. A large number of black-box attack methods have been proposed to in the literature.
Junjie Fu, Jian Sun 0003, Gang Wang 0014
openaire +2 more sources
Digital twins to accelerate target identification and drug development for immune‐mediated disorders
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley +1 more source
Curls & Whey: Boosting Black-Box Adversarial Attacks [PDF]
CVPR 2019 ...
Yucheng Shi, Siyu Wang, Yahong Han
openaire +2 more sources
Long‐term hippocampal alterations and cognitive impairment in a murine model of surgical sepsis
Using a mouse model of surgical sepsis, we tested long‐term memory and analyzed the transcriptome of single cells isolated from the hippocampus. Survivor mice showed worse memory, loss of certain brain cell subpopulations, and abnormal immune cell activity—suggesting that post‐sepsis brain alterations may be linked to cognitive deficits.
Dong Seong Cho +4 more
wiley +1 more source

