Results 101 to 110 of about 23,714 (241)

VENOM: Text-driven Unrestricted Adversarial Example Generation with Diffusion Models [PDF]

open access: yesarXiv
Adversarial attacks have proven effective in deceiving machine learning models by subtly altering input images, motivating extensive research in recent years. Traditional methods constrain perturbations within $l_p$-norm bounds, but advancements in Unrestricted Adversarial Examples (UAEs) allow for more complex, generative-model-based manipulations ...
arxiv  

Partially Directed Snake Polyominoes [PDF]

open access: yesarXiv, 2013
The goal of this paper is to study the family of snake polyominoes. More precisely, we focus our attention on the class of partially directed snakes. We establish functional equations and length generating functions of two dimensional, three dimensional and then $N$ dimensional partially directed snake polyominoes.
arxiv  

Fractionation of Snake Venom by the Gel-Filtration Method. [PDF]

open access: bronze, 1959
Walter Björk   +5 more
openalex   +1 more source

Distinct regulatory networks control toxin gene expression in elapid and viperid snakes

open access: yesBMC Genomics
Background Venom systems are ideal models to study genetic regulatory mechanisms that underpin evolutionary novelty. Snake venom glands are thought to share a common origin, but there are major distinctions between venom toxins from the medically ...
Cassandra M. Modahl   +8 more
doaj   +1 more source

A general approach to enhance the survivability of backdoor attacks by decision path coupling [PDF]

open access: yesarXiv
Backdoor attacks have been one of the emerging security threats to deep neural networks (DNNs), leading to serious consequences. One of the mainstream backdoor defenses is model reconstruction-based. Such defenses adopt model unlearning or pruning to eliminate backdoors. However, little attention has been paid to survive from such defenses.
arxiv  

Snake graph calculus and cluster algebras from surfaces II: Self-crossing snake graphs [PDF]

open access: yesarXiv, 2014
Snake graphs appear naturally in the theory of cluster algebras. For cluster algebras from surfaces, each cluster variable is given by a formula which is parametrized by the perfect matchings of a snake graph. In this paper, we continue our study of snake graphs from a combinatorial point of view.
arxiv  

Subdivision based snakes for contour detection [PDF]

open access: yesarXiv, 2018
In this paper we propose a method for computing the contour of an object in an image using a snake represented as a subdivision curve. The evolution of the snake is driven by its control points which are computed minimizing an energy that pushes the snake towards the boundary of the interest region.
arxiv  

Globally centered discrete snakes [PDF]

open access: yesarXiv, 2006
We consider branching random walks built on Galton-Watson trees with offspring distribution having a bounded support, conditioned to have $n$ nodes, and their rescaled convergences to the Brownian snake. We exhibit a notion of "globally centered discrete snake'' that extends the usual settings in which the displacements are supposed centered.
arxiv  

Home - About - Disclaimer - Privacy