Results 61 to 70 of about 1,173,800 (295)

Redefining Therapies for Drug‐Resistant Tuberculosis: Synergistic Effects of Antimicrobial Peptides, Nanotechnology, and Computational Design

open access: yesAdvanced Healthcare Materials, EarlyView.
Antimicrobial peptide (AMP)‐loaded nanocarriers provide a multifunctional strategy to combat drug‐resistant Mycobacterium tuberculosis. By enhancing intracellular delivery, bypassing efflux pumps, and disrupting bacterial membranes, this platform restores phagolysosome fusion and macrophage function.
Christian S. Carnero Canales   +11 more
wiley   +1 more source

Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains

open access: yes, 2017
While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication
Kantardzic, Mehmed, Sethi, Tegjyot Singh
core   +1 more source

Characterizing Internal Evasion Attacks in Federated Learning

open access: yes, 2022
16 pages, 8 figures (14 images if counting sub-figures separately), Camera ready version for AISTATS 2023, longer version of paper submitted to CrossFL 2022 poster workshop, code available at (https://github.com/tj-kim/pFedDef_v1)
Kim, Taejin   +3 more
openaire   +2 more sources

Evaluating the Antiviral Efficacy of Encapsulated PKC Inhibitor BIM‐I against influenza A Virus Infection

open access: yesAdvanced Healthcare Materials, EarlyView.
This study explores nanoparticle delivery of the protein kinase C inhibitor bisindolylmaleimide‐I (BIM‐I) to combat influenza A virus infections. Encapsulation in biodegradable PLGA nanoparticles improved safety while maintaining the compound's strong antiviral activity.
Laura Klement   +12 more
wiley   +1 more source

Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection

open access: yesElectronics
As deep learning models become more prevalent in smart grid systems, ensuring their accuracy in tasks like identifying abnormal customer behavior is increasingly important.
Santosh Nirmal, Pramod Patil
doaj   +1 more source

ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model

open access: yesEntropy, 2023
The research on image-classification-adversarial attacks is crucial in the realm of artificial intelligence (AI) security. Most of the image-classification-adversarial attack methods are for white-box settings, demanding target model gradients and ...
Zhongwang Fu, Xiaohui Cui
doaj   +1 more source

On Security and Sparsity of Linear Classifiers for Adversarial Settings

open access: yes, 2016
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test ...
B Biggio   +11 more
core   +1 more source

Mitochondrial Transplantation via Magnetically Responsive Artificial Cells Promotes Intracerebral Hemorrhage Recovery by Supporting Microglia Immunological Homeostasis

open access: yesAdvanced Materials, Volume 37, Issue 13, April 2, 2025.
A type of magnetically responsive artificial cells (ACs) has been developed, demonstrating the loading of mitochondria and self‐enclosure processes to ensure the protection of mitochondrial transport via the bloodstream. The treatment with ACs effectively transplanted mitochondria around the lesion, thereby improving neurological recovery by supporting
Mi Zhou   +10 more
wiley   +1 more source

The Study on a Fighter Against a Medium-range Air-to-air Missile Based on Deep Deterministic Policy Gradient Algorithm

open access: yesHangkong gongcheng jinzhan, 2021
The evasive maneuver strategy for a fighter against a medium-range air-to-air missile is crucial to improving aircraft survivability.In this paper, the deep deterministic policy gradient algorithm to train the agent to learn the evasive maneuver strategy
SONG Hongchuan   +4 more
doaj   +1 more source

Practical Attacks Against Graph-based Clustering

open access: yes, 2017
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich   +19 more
core   +1 more source

Home - About - Disclaimer - Privacy