Results 41 to 50 of about 60,338 (274)
Intrusion detection and prevention are two of the most important issues to solve in network security infrastructure. Intrusion detection systems (IDSs) protect networks by using patterns to detect malicious traffic. As attackers have tried to dissimulate
Andrei-Grigore Mari +2 more
doaj +1 more source
Flow-GAN: Combining Maximum Likelihood and Adversarial Learning in Generative Models
Adversarial learning of probabilistic models has recently emerged as a promising alternative to maximum likelihood. Implicit models such as generative adversarial networks (GAN) often generate better samples compared to explicit models trained by maximum
Dhar, Manik +2 more
core +1 more source
2D Nanomaterials Toward Function‐Ready Superlubricity in Advanced Microsystems
A unified framework links structural and transformation superlubricity with microsystem functions and deployment requirements. Mechanisms, device architectures, integration strategies, AI‐guided discovery, and benchmarking protocols are connected to define function‐ready superlubricity in advanced microsystems.
Yushan Geng, Jun Yang, Yong Yang
wiley +1 more source
Investigating the effect of loss functions on single-image GAN performance
Loss functions are crucial in training generative adversarial networks (GANs) and shaping the resulting outputs. These functions, specifically designed for GANs, optimize generator and discriminator networks together but in opposite directions.
Eyyup YİLDİZ +2 more
doaj +1 more source
The article overviews past and current efforts on caloric materials and systems, highlighting the contributions of Ames National Laboratory to the field. Solid‐state caloric heat pumping is an innovative method that can be implemented in a wide range of cooling and heating applications.
Agata Czernuszewicz +5 more
wiley +1 more source
Adversarial Examples Detection for XSS Attacks Based on Generative Adversarial Networks
Models based on deep learning are prone to misjudging the results when faced with adversarial examples. In this paper, we propose an MCTS-T algorithm for generating adversarial examples of cross-site scripting (XSS) attacks based on Monte Carlo tree ...
Xueqin Zhang +4 more
doaj +1 more source
iVAE-GAN: Identifiable VAE-GAN Models for Latent Representation Learning
Remarkable progress has been made within nonlinear Independent Component Analysis (ICA) and identifiable deep latent variable models. Formally, the latest nonlinear ICA theory enables us to recover the true latent variables up to a linear transformation ...
Bjorn Uttrup Dideriksen +2 more
doaj +1 more source
Learning Highly Dynamic Skills Transition for Quadruped Jumping Through Constrained Space
A quadruped robot masters dynamic jumps through constrained spaces with animal‐inspired moves and intelligent vision control. This hierarchical learning approach combines imitation of biological agility with real‐time trajectory planning. Although legged animals are capable of performing explosive motions while traversing confined spaces, replicating ...
Zeren Luo +6 more
wiley +1 more source
Stable Imitation of Multigait and Bipedal Motions for Quadrupedal Robots Over Uneven Terrains
How are quadrupedal robots empowered to execute complex navigation tasks, including multigait and bipedal motions? Challenges in stability and real‐world adaptation persist, especially with uneven terrains and disturbances. This article presents an imitation learning framework that enhances adaptability and robustness by incorporating long short‐term ...
Erdong Xiao +3 more
wiley +1 more source
Recent Advances of Generative Adversarial Networks in Computer Vision
The appearance of generative adversarial networks (GAN) provides a new approach and framework for computer vision. Compared with traditional machine learning algorithms, GAN works via adversarial training concept and is more powerful in both feature ...
Yang-Jie Cao +8 more
doaj +1 more source

