Results 51 to 60 of about 448,167 (282)

Boundary Black-box Adversarial Example Generation Algorithm on Video Recognition Models [PDF]

open access: yesJisuanji kexue
With the rapid development of deep learning,neural networks are widely used in various fields.However,neural networks still face the problem of adversarial attacks.Among all types of adversarial attacks,the boundary black-box attack can only obtain the ...
JING Yulin, WU Lijun, LI Zhiyuan, DENG Qi
doaj   +1 more source

Dix petits hacks Tinder : les algorithmes au service d’une économie spéculative des rencontres amoureuses et sexuelles

open access: yesTic & Société, 2021
The mediation of love and sexuality has often relied on dating advice. This paper analyses a corpus of dating guides concerning the popular app Tinder. Our analysis suggests that the practice of algorithmic blackboxing, that is, characterizing algorithms
David MYLES, Martin BLAIS
doaj   +1 more source

What is a black box algorithm?

open access: yes, 2023
Companies or institutions (Divinities) disintermediate their relations with users via decision-making algorithms (Pythias): users (mortals) are offered arbitrary decisions (oracles) during their interactions.How to apprehend these black box algorithms, from the point of view of a user or regulator?
Le Merrer, Erwan, Trédan, Gilles
openaire   +1 more source

Black-Box Algorithms for Sampling from Continuous Distributions

open access: yesProceedings of the 2006 Winter Simulation Conference, 2006
For generating non-uniform random variates, black-box algorithms are powerful tools that allow drawing samples from large classes of distri- butions. We give an overview of the design principles of such methods and show that they have advantages compared to specialized algorithms even for standard distributions, e.g., the marginal generation times are ...
Hörmann, Wolfgang, Leydold, Josef
openaire   +5 more sources

Computing Star Discrepancies with Numerical Black-Box Optimization Algorithms

open access: yesProceedings of the Genetic and Evolutionary Computation Conference, 2023
To appear in the Proceedings of GECCO ...
François Clément   +5 more
openaire   +4 more sources

Polarization‐resolved femtosecond Vis/IR spectroscopy tailored for resolving weak signals in biological samples using minimal sample volume

open access: yesFEBS Open Bio, EarlyView.
Unique biological samples, such as site‐specific mutant proteins, are available only in limited quantities. Here, we present a polarization‐resolved transient infrared spectroscopy setup with referencing to improve signal‐to‐noise tailored towards tracing small signals. We provide an overview of characterizing the excitation conditions for polarization‐
Clark Zahn, Karsten Heyne
wiley   +1 more source

Privacy and Accountability in Black-Box Medicine [PDF]

open access: yes, 2016
Black-box medicine—the use of big data and sophisticated machine learning techniques for health-care applications—could be the future of personalized medicine.
Ford, Roger Allan   +1 more
core   +3 more sources

Restarted Local Search Algorithms for Continuous Black Box Optimization [PDF]

open access: yesEvolutionary Computation, 2012
Several local search algorithms for real-valued domains (axis parallel line search, Nelder-Mead simplex search, Rosenbrock's algorithm, quasi-Newton method, NEWUOA, and VXQR) are described and thoroughly compared in this article, embedding them in a multi-start method.
Pošík, Petr, Huyer, Waltraud
openaire   +3 more sources

Digital twins to accelerate target identification and drug development for immune‐mediated disorders

open access: yesFEBS Open Bio, EarlyView.
Digital twins integrate patient‐derived molecular and clinical data into personalised computational models that simulate disease mechanisms. They enable rapid identification and validation of therapeutic targets, prediction of drug responses, and prioritisation of candidate interventions.
Anna Niarakis, Philippe Moingeon
wiley   +1 more source

Home - About - Disclaimer - Privacy