Results 41 to 50 of about 448,167 (282)

A comprehensive transplanting of black-box adversarial attacks from multi-class to multi-label models

open access: yesComplex & Intelligent Systems
Adversarial examples generated by perturbing raw data with carefully designed, imperceptible noise have emerged as a primary security threat to artificial intelligence systems.
Zhijian Chen   +3 more
doaj   +1 more source

Colorectal cancer‐derived FGF19 is a metabolically active serum biomarker that exerts enteroendocrine effects on mouse liver

open access: yesMolecular Oncology, EarlyView.
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley   +5 more
wiley   +1 more source

Trusting AI made decisions in healthcare by making them explainable

open access: yesScience Progress
Objectives In solving the trust issues surrounding machine learning algorithms whose reasoning cannot be understood, advancements can be made toward the integration of machine learning algorithms into mHealth applications.
Bojan Žlahtič   +6 more
doaj   +1 more source

On the Relation Between Quantum Computational Speedup and Retrocausality

open access: yesQuanta, 2016
We investigate the reason for the quantum speedup (quantum algorithms require fewer computation steps than their classical counterparts). We extend the representation of the quantum algorithm to the process of setting the problem, namely choosing the ...
Giuseppe Castagnoli
doaj   +1 more source

Interfacing external quantum devices to a universal quantum computer. [PDF]

open access: yesPLoS ONE, 2011
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations.
Antonio A Lagana   +2 more
doaj   +1 more source

Unbiased Black-Box Complexities of Jump Functions

open access: yes, 2014
We analyze the unbiased black-box complexity of jump functions with small, medium, and large sizes of the fitness plateau surrounding the optimal solution.
Doerr, Benjamin   +2 more
core   +2 more sources

Black-Box Randomized Reductions in Algorithmic Mechanism Design [PDF]

open access: yesSIAM Journal on Computing, 2010
We give the first black-box reduction from approximation algorithms to truthful approximation mechanisms for a non-trivial class of multi-parameter problems. Specifically, we prove that every welfare-maximization problem that admits a fully polynomial-time approximation scheme (FPTAS) and can be encoded as a packing problem also admits a truthful-in ...
Shaddin Dughmi, Tim Roughgarden
openaire   +1 more source

Comparing Algorithm Selection Approaches on Black-Box Optimization Problems

open access: yesProceedings of the Companion Conference on Genetic and Evolutionary Computation, 2023
Performance complementarity of solvers available to tackle black-box optimization problems gives rise to the important task of algorithm selection (AS). Automated AS approaches can help replace tedious and labor-intensive manual selection, and have already shown promising performance in various optimization domains.
Kostovska, Ana   +5 more
openaire   +5 more sources

Identification of serum protein biomarkers for pre‐cancerous lesions associated with pancreatic ductal adenocarcinoma

open access: yesMolecular Oncology, EarlyView.
This work identified serum proteins associated with pancreatic epithelial neoplasms (PanINs) and early‐stage PDAC. Proteomics screens assessed genetically engineered mice with abundant PanINs, KPC mice (Lox‐STOP‐Lox‐KrasG12D/+ Lox‐STOP‐Lox‐Trp53R172H/+ Pdx1‐Cre) before PDAC development and also early‐stage PDAC patients (n = 31), compared to benign ...
Hannah Mearns   +10 more
wiley   +1 more source

Black-box Attack Algorithm for SAR-ATR Deep Neural Networks Based on MI-FGSM

open access: yesLeida xuebao
The field of Synthetic Aperture Radar Automatic Target Recognition (SAR-ATR) lacks effective black-box attack algorithms. Therefore, this research proposes a migration-based black-box attack algorithm by combining the idea of the Momentum Iterative Fast ...
Xuanshen WAN   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy