Results 31 to 40 of about 3,609,102 (305)
Practical Black-Box Attacks against Machine Learning [PDF]
Machine learning (ML) models, e.g., deep neural networks (DNNs), are vulnerable to adversarial examples: malicious inputs modified to yield erroneous model outputs, while appearing unmodified to human observers. Potential attacks include having malicious
Nicolas Papernot +5 more
semanticscholar +1 more source
GPT-NAS: Neural Architecture Search Meets Generative Pre-Trained Transformer Model
The pursuit of optimal neural network architectures is foundational to the progression of Neural Architecture Search (NAS). However, the existing NAS methods suffer from the following problem using traditional search strategies, i.e., when facing a large
Caiyang Yu +7 more
doaj +1 more source
A Study on Tooth Wear Mechanisms During the Bandsawing of Cr12MoV with a Bimetal Bandsaw Blade
Bandsaw blades are typical band-shaped cutting tools that are characterized by their low stiffness and micro-level cutting depth, resulting in distinct wear mechanisms compared to rigid cutting tools.
Yuzhen Jia +5 more
doaj +1 more source
A Systematic Review on NOMA Variants for 5G and Beyond
Over the last few years, interference has been a major hurdle for successfully implementing various end-user applications in the fifth-generation (5G) of wireless networks.
Ishan Budhiraja +6 more
doaj +1 more source
Bleu: a Method for Automatic Evaluation of Machine Translation
Human evaluations of machine translation are extensive but expensive. Human evaluations can take months to finish and involve human labor that can not be reused.
Kishore Papineni +3 more
semanticscholar +1 more source
Application Protocols enabling Internet of Remote Things via Random Access Satellite Channels
Nowadays, Machine-to-Machine (M2M) and Internet of Things (IoT) traffic rate is increasing at a fast pace. The use of satellites is expected to play a large role in delivering such a traffic. In this work, we investigate the use of two of the most common
Bacco, Manlio +2 more
core +1 more source
A bounded heuristic for collection-based routing in wireless sensor networks [PDF]
Wireless sensor networks are used to monitor and control physical phenomena and to provide interaction between clients and the physical environment. Clients have been typically users or user applications, but next generation wireless sensor networks will
Barradas, Álvaro +4 more
core +1 more source
Multimodal Machine Learning: A Survey and Taxonomy [PDF]
Our experience of the world is multimodal - we see objects, hear sounds, feel texture, smell odors, and taste flavors. Modality refers to the way in which something happens or is experienced and a research problem is characterized as multimodal when it ...
T. Baltrušaitis +2 more
semanticscholar +1 more source
Fast Adaptive S-ALOHA Scheme for Event-driven Machine-to-Machine Communications
Machine-to-Machine (M2M) communication is now playing a market-changing role in a wide range of business world. However, in event-driven M2M communications, a large number of devices activate within a short period of time, which in turn causes high radio
La, Richard J. +4 more
core +1 more source
Deep learning and self-supervised learning techniques have advanced, making it possible to diagnose medical images more accurately. Our goal in this work is to increase the accuracy of medical diagnosis using chest X-rays by utilising information ...
Jaydeep Kishore +5 more
doaj +1 more source

