Results 221 to 230 of about 372,889 (280)

ConvNet-Generated Adversarial Perturbations for Evaluating 3D Object Detection Robustness. [PDF]

open access: yesSensors (Basel)
Abraha TM   +4 more
europepmc   +1 more source

Invisible Text Injection and Peer Review by AI Models.

open access: yesJAMA Netw Open
Choi B   +8 more
europepmc   +1 more source

Ship infrared detection/vulnerability [PDF]

open access: possibleSPIE Proceedings, 1993
The IR contrast of ships at sea is of importance for those who want to detect or identify the ship and for those who worry about this. This IR contrast is determined by a large number of parameters. Of course temperatures of the ship's structure and those of the ambient sea and air are important, but also important are the reflection properties of the ...
openaire   +1 more source

Comparison of Active Vulnerability Scanning vs. Passive Vulnerability Detection

2021 International Conference on Information Security and Cryptology (ISCTURKEY), 2021
Vulnerability analysis is an integral part of an overall security program. Through identifying known security flaws and weaknesses, vulnerability identification tools help security practitioners to remediate the existing vulnerabilities on the networks.
openaire   +2 more sources

Vulnerable Plaque: Detection and Management

Medical Clinics of North America, 2007
Because most myocardial infarctions result from the rupture of a plaque that did not significantly compromise the coronary lumen before the event, experts widely accept that the morphology, composition, and degree of inflammation of a coronary atherosclerotic plaque is more important than the degree of luminal stenosis.
Mario, Gössl   +6 more
openaire   +2 more sources

Home - About - Disclaimer - Privacy