Results 111 to 120 of about 1,173,800 (295)

Adversarial measurements for convolutional neural network-based energy theft detection model in smart grid

open access: yese-Prime: Advances in Electrical Engineering, Electronics and Energy
Electricity theft has become a major problem worldwide and is a significant headache for utility companies. It not only results in revenue loss but also disrupts the quality of electricity, increases generation costs, and raises overall electricity ...
Santosh Nirmal   +2 more
doaj   +1 more source

High‐Content SRS Imaging Unveils Altered Cholesterol Metabolism in Ovarian Cancers Under CAR‐T Treatment

open access: yesAdvanced Science, EarlyView.
High‐content Stimulated Raman Scattering (SRS) Imaging reveals that ovarian cancer cells surviving Chimeric Antigen Receptor (CAR) ‐T cell challenge exhibit increased cholesterol esterification. Pharmacological inhibition of this pathway with Avasimibe significantly enhances CAR‐T induced killing of ovarian cancer cells by reducing cancer cell ...
Chinmayee V. Prabhu Dessai   +8 more
wiley   +1 more source

Adversarial Evasion Attack Efficiency Against Large Language Models

open access: yes
Large Language Models (LLMs) are valuable for text classification, but their vulnerabilities must not be disregarded. They lack robustness against adversarial examples, so it is pertinent to understand the impacts of different types of perturbations, and assess if those attacks could be replicated by common users with a small amount of perturbations ...
João Vitorino, Eva Maia, Isabel Praça
openaire   +2 more sources

Cytokine‐Engineered Chimeric Antigen Receptor‐T Cell Therapy: How to Balance the Efficacy and Toxicity

open access: yesAdvanced Science, EarlyView.
Cytokine‐engineered CAR‐T cells represent a promising immunotherapy against malignancies due to direct tumor killing and potent immunity response. However, significant toxicities, including CRS and ICANS, have restricted clinical applications. How to keep the risk‐benefit balance of the advanced therapy is of great importance for maximizing the benefit
Xinru Zhang   +7 more
wiley   +1 more source

Adversarial Attacks with Defense Mechanisms on Convolutional Neural Networks and Recurrent Neural Networks for Malware Classification

open access: yesApplied Sciences
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inputs,
Sharoug Alzaidy, Hamad Binsalleeh
doaj   +1 more source

NK Cell Activation by Platinum Boosts Immunotherapy in HR+/HER2− Breast Cancer

open access: yesAdvanced Science, EarlyView.
Multi‐omics and single‐cell analyses identify activated NK cells as key mediators of anti‐PD‐(L)1 response in HR+/HER2− breast cancer. Platinum chemotherapy enhances NK cell cytotoxicity through NF‐κB–associated signaling, synergizing with immunotherapy and providing a rationale for combination treatment.
Yi‐Yu Chen   +8 more
wiley   +1 more source

A Survey on Adversarial Attacks for Malware Analysis

open access: yesIEEE Access
Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats.
Kshitiz Aryal   +4 more
doaj   +1 more source

Faster Repeated Evasion Attacks in Tree Ensembles

open access: yesAdvances in Neural Information Processing Systems 37
Tree ensembles are one of the most widely used model classes. However, these models are susceptible to adversarial examples, i.e., slightly perturbed examples that elicit a misprediction. There has been significant research on designing approaches to construct such examples for tree ensembles.
Cascioli, Lorenzo   +3 more
openaire   +3 more sources

Trojan Horse Strategy: How Biomimetic Nanomedicine Remodels the Tumor Microenvironment

open access: yesAdvanced Science, EarlyView.
This review focuses on biomimetic nanomedicines for tumor microenvironment (TME) remodeling, covering their diverse biomimetic types, design principles, and mechanisms of immune cell reprogramming and reversal of immunosuppressive microenvironments, with particular emphasis on their application in synergistic immunotherapy.
Wanrong Wang   +7 more
wiley   +1 more source

Evasion Attacks against Banking Fraud Detection Systems

open access: yes, 2020
Machine learning models are vulnerable to adversarial samples: inputs crafted to deceive a classifier. Adversarial samples crafted against one model can be effective also against related models. Therefore, even without a comprehensive knowledge of the target system, a malicious agent can attack it by training a surrogate model and crafting evasive ...
M. Carminati   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy