Results 101 to 110 of about 478,564 (335)

Poisons that are learned faster are more effective [PDF]

open access: yesarXiv, 2022
Imperceptible poisoning attacks on entire datasets have recently been touted as methods for protecting data privacy. However, among a number of defenses preventing the practical use of these techniques, early-stopping stands out as a simple, yet effective defense.
arxiv  

Caribbean slavery, British abolition and the cultural politics of venereal disease in the Atlantic world [PDF]

open access: yes, 2012
Venereal disease was commonplace among free and enslaved populations in colonial Caribbean societies. This article considers how contemporaries (both in the empire and metropole) viewed venereal infection and how they associated it with gendered notions ...
Burnard, Trevor, Follett, Richard
core   +2 more sources

Electrochemical Fabrication of Nanoparticles and Single‐Atom Catalysts via Cathodic Corrosion

open access: yesChemistry – A European Journal, EarlyView.
While cathodic corrosion can be detrimental to electrode surfaces, it has emerged as a powerful electrochemical method for fabricating nanoparticles and single‐atom catalysts from bulk wires. This mini‐review highlights recent advancements in cathodic corrosion‐based synthesis, focusing on its unique capabilities and the superior (photo ...
Mohamed M. Elnagar   +2 more
wiley   +1 more source

Mercury's Protoplanetary Mass [PDF]

open access: yesarXiv, 2004
Major element fractionation among chondrites has been discussed for decades as ratios relative to Si or Mg. Recently, by expressing ratios relative to Fe, I discovered a new relationship admitting the possibility that ordinary chondrite meteorites are derived from two components, a relatively oxidized and undifferentiated, primitive component and a ...
arxiv  

Detecting Backdoor Poisoning Attacks on Deep Neural Networks by Heatmap Clustering [PDF]

open access: yesarXiv, 2022
Predicitions made by neural networks can be fraudulently altered by so-called poisoning attacks. A special case are backdoor poisoning attacks. We study suitable detection methods and introduce a new method called Heatmap Clustering. There, we apply a $k$-means clustering algorithm on heatmaps produced by the state-of-the-art explainable AI method ...
arxiv  

Abatement of mercury pollution in aquatic systems: A biotechnological approach [PDF]

open access: yes, 1996
Mercury has been in use since time immemorial for medicinal, agricultural and industrial purposes. It is widely used in the manufacture of thennometers, fungicides, insecticides, batteries, caustic soda, pulp and paper, urethane plastics and many other ...
Alavandi, S V   +2 more
core  

Determination of Arsenic, Mercury and Barium in herbarium mount paper using dynamic ultrasound-assisted extraction prior to atomic fluorescence and absorption spectrometry [PDF]

open access: yes, 2011
A dynamic ultrasound-assisted extraction method using Atomic Absorption and Atomic Flourescence spectrometers as detectors was developed to analyse mercury, arsenic and barium from herbarium mount paper originating from the herbarium collection of the ...
B. Chen   +13 more
core   +1 more source

Probing Activation and Deactivation Mechanisms in Electrochemical CO2 Reduction Reaction and Water Splitting through In‐Situ/Operando Analysis

open access: yesChemistry–Methods, EarlyView.
In‐situ/operando characterization techniques have been improved rapidly under the need to observe the changes on catalytic materials in operational conditions. This perspective highlights the recent works on applying in‐situ/operando analysis to electrocatalysts for CO2 reduction reaction and water splitting. Abstract The transition to a carbon‐neutral
Woo Seok Cheon, Jaehyun Kim, Ho Won Jang
wiley   +1 more source

FRIB: Low-poisoning Rate Invisible Backdoor Attack based on Feature Repair [PDF]

open access: yesarXiv, 2022
During the generation of invisible backdoor attack poisoned data, the feature space transformation operation tends to cause the loss of some poisoned features and weakens the mapping relationship between source images with triggers and target labels, resulting in the need for a higher poisoning rate to achieve the corresponding backdoor attack success ...
arxiv  

Capturing Electrochemically Galvanic Exchange Events between Silver and Gold in Nonequilibrium and Equilibrium Realms

open access: yesChemistry–Methods, EarlyView.
A new methodology is presented to study the kinetics of the galvanic replacement reaction between silver and gold, allowing, for the first time to our knowledge, real‐time monitoring of the dynamics of this redox reaction by quantifying the main driving force, that is, the time‐ and concentration‐dependent redox potential, which cannot be captured by ...
Bonito Aristide Karamoko   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy