Results 41 to 50 of about 448,167 (282)
Adversarial examples generated by perturbing raw data with carefully designed, imperceptible noise have emerged as a primary security threat to artificial intelligence systems.
Zhijian Chen +3 more
doaj +1 more source
Meta‐transcriptome analysis identified FGF19 as a peptide enteroendocrine hormone associated with colorectal cancer prognosis. In vivo xenograft models showed release of FGF19 into the blood at levels that correlated with tumor volumes. Tumoral‐FGF19 altered murine liver metabolism through FGFR4, thereby reducing bile acid synthesis and increasing ...
Jordan M. Beardsley +5 more
wiley +1 more source
Trusting AI made decisions in healthcare by making them explainable
Objectives In solving the trust issues surrounding machine learning algorithms whose reasoning cannot be understood, advancements can be made toward the integration of machine learning algorithms into mHealth applications.
Bojan Žlahtič +6 more
doaj +1 more source
On the Relation Between Quantum Computational Speedup and Retrocausality
We investigate the reason for the quantum speedup (quantum algorithms require fewer computation steps than their classical counterparts). We extend the representation of the quantum algorithm to the process of setting the problem, namely choosing the ...
Giuseppe Castagnoli
doaj +1 more source
Interfacing external quantum devices to a universal quantum computer. [PDF]
We present a scheme to use external quantum devices using the universal quantum computer previously constructed. We thereby show how the universal quantum computer can utilize networked quantum information resources to carry out local computations.
Antonio A Lagana +2 more
doaj +1 more source
Unbiased Black-Box Complexities of Jump Functions
We analyze the unbiased black-box complexity of jump functions with small, medium, and large sizes of the fitness plateau surrounding the optimal solution.
Doerr, Benjamin +2 more
core +2 more sources
Black-Box Randomized Reductions in Algorithmic Mechanism Design [PDF]
We give the first black-box reduction from approximation algorithms to truthful approximation mechanisms for a non-trivial class of multi-parameter problems. Specifically, we prove that every welfare-maximization problem that admits a fully polynomial-time approximation scheme (FPTAS) and can be encoded as a packing problem also admits a truthful-in ...
Shaddin Dughmi, Tim Roughgarden
openaire +1 more source
Comparing Algorithm Selection Approaches on Black-Box Optimization Problems
Performance complementarity of solvers available to tackle black-box optimization problems gives rise to the important task of algorithm selection (AS). Automated AS approaches can help replace tedious and labor-intensive manual selection, and have already shown promising performance in various optimization domains.
Kostovska, Ana +5 more
openaire +5 more sources
This work identified serum proteins associated with pancreatic epithelial neoplasms (PanINs) and early‐stage PDAC. Proteomics screens assessed genetically engineered mice with abundant PanINs, KPC mice (Lox‐STOP‐Lox‐KrasG12D/+ Lox‐STOP‐Lox‐Trp53R172H/+ Pdx1‐Cre) before PDAC development and also early‐stage PDAC patients (n = 31), compared to benign ...
Hannah Mearns +10 more
wiley +1 more source
Black-box Attack Algorithm for SAR-ATR Deep Neural Networks Based on MI-FGSM
The field of Synthetic Aperture Radar Automatic Target Recognition (SAR-ATR) lacks effective black-box attack algorithms. Therefore, this research proposes a migration-based black-box attack algorithm by combining the idea of the Momentum Iterative Fast ...
Xuanshen WAN +3 more
doaj +1 more source

