Results 61 to 70 of about 1,173,800 (295)
Antimicrobial peptide (AMP)‐loaded nanocarriers provide a multifunctional strategy to combat drug‐resistant Mycobacterium tuberculosis. By enhancing intracellular delivery, bypassing efflux pumps, and disrupting bacterial membranes, this platform restores phagolysosome fusion and macrophage function.
Christian S. Carnero Canales +11 more
wiley +1 more source
Data Driven Exploratory Attacks on Black Box Classifiers in Adversarial Domains
While modern day web applications aim to create impact at the civilization level, they have become vulnerable to adversarial activity, where the next cyber-attack can take any shape and can originate from anywhere. The increasing scale and sophistication
Kantardzic, Mehmed, Sethi, Tegjyot Singh
core +1 more source
Characterizing Internal Evasion Attacks in Federated Learning
16 pages, 8 figures (14 images if counting sub-figures separately), Camera ready version for AISTATS 2023, longer version of paper submitted to CrossFL 2022 poster workshop, code available at (https://github.com/tj-kim/pFedDef_v1)
Kim, Taejin +3 more
openaire +2 more sources
This study explores nanoparticle delivery of the protein kinase C inhibitor bisindolylmaleimide‐I (BIM‐I) to combat influenza A virus infections. Encapsulation in biodegradable PLGA nanoparticles improved safety while maintaining the compound's strong antiviral activity.
Laura Klement +12 more
wiley +1 more source
Deceptive Maneuvers: Subverting CNN-AdaBoost Model for Energy Theft Detection
As deep learning models become more prevalent in smart grid systems, ensuring their accuracy in tasks like identifying abnormal customer behavior is increasingly important.
Santosh Nirmal, Pramod Patil
doaj +1 more source
ELAA: An Ensemble-Learning-Based Adversarial Attack Targeting Image-Classification Model
The research on image-classification-adversarial attacks is crucial in the realm of artificial intelligence (AI) security. Most of the image-classification-adversarial attack methods are for white-box settings, demanding target model gradients and ...
Zhongwang Fu, Xiaohui Cui
doaj +1 more source
On Security and Sparsity of Linear Classifiers for Adversarial Settings
Machine-learning techniques are widely used in security-related applications, like spam and malware detection. However, in such settings, they have been shown to be vulnerable to adversarial attacks, including the deliberate manipulation of data at test ...
B Biggio +11 more
core +1 more source
A type of magnetically responsive artificial cells (ACs) has been developed, demonstrating the loading of mitochondria and self‐enclosure processes to ensure the protection of mitochondrial transport via the bloodstream. The treatment with ACs effectively transplanted mitochondria around the lesion, thereby improving neurological recovery by supporting
Mi Zhou +10 more
wiley +1 more source
The evasive maneuver strategy for a fighter against a medium-range air-to-air missile is crucial to improving aircraft survivability.In this paper, the deep deterministic policy gradient algorithm to train the agent to learn the evasive maneuver strategy
SONG Hongchuan +4 more
doaj +1 more source
Practical Attacks Against Graph-based Clustering
Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.
Bayer Ulrich +19 more
core +1 more source

