29   Artículos

« Anterior     Página: 1 de 2     Siguiente »

 
en línea
Doyeob Yeo, Min-Suk Kim and Ji-Hoon Bae    
A deep-learning technology for knowledge transfer is necessary to advance and optimize efficient knowledge distillation. Here, we aim to develop a new adversarial optimization-based knowledge transfer method involved with a layer-wise dense flow that is ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zahid Masood, Muhammad Usama, Shahroz Khan, Konstantinos Kostas and Panagiotis D. Kaklis    
Generative models offer design diversity but tend to be computationally expensive, while non-generative models are computationally cost-effective but produce less diverse and often invalid designs. However, the limitations of non-generative models can be... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Amani Alqarni and Hamoud Aljamaan    
Software defect prediction is an active research area. Researchers have proposed many approaches to overcome the imbalanced defect problem and build highly effective machine learning models that are not biased towards the majority class. Generative adver... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yun Sha, Zhaoyu Chen, Xuejun Liu, Yong Yan, Chenchen Du, Jiayi Liu and Ranran Han    
The scarcity of attack samples is the bottleneck problem of anomaly detection of underlying business data in the industrial control system. Predecessors have done a lot of research on temporal data generation, but most of them are not suitable for indust... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Dejian Guan, Wentao Zhao and Xiao Liu    
Recent studies show that deep neural networks (DNNs)-based object recognition algorithms overly rely on object textures rather than global object shapes, and DNNs are also vulnerable to human-less perceptible adversarial perturbations. Based on these two... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Zheng-Lian Su, Xun-Lin Jiang, Ning Li, Hai-Feng Ling and Yu-Jun Zheng    
Unmanned aerial vehicles (UAVs) have been widely used for target detection in modern battlefields. From the viewpoint of the opponents, false target jamming is an effective approach to decrease the UAV detection ability or probability, but currently ther... ver más
Revista: Drones    Formato: Electrónico

 
en línea
Vitor Nazário Coelho, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang and Igor Machado Coelho    
Mixed-integer mathematical programming has been widely used to model and solve challenging optimization problems. One interesting feature of this technique is the ability to prove the optimality of the achieved solution, for many practical scenarios wher... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Zuwei Tan, Runze Li and Yufei Zhang    
The inlet is one of the most important components of a hypersonic vehicle. The design and optimization of the hypersonic inlet is of great significance to the research and development of hypersonic vehicles. In recent years, artificial intelligence techn... ver más
Revista: Aerospace    Formato: Electrónico

 
en línea
Weimin Zhao, Sanaa Alwidian and Qusay H. Mahmoud    
Deep neural networks are exposed to the risk of adversarial attacks via the fast gradient sign method (FGSM), projected gradient descent (PGD) attacks, and other attack algorithms. Adversarial training is one of the methods used to defend against the thr... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Chunhe Hu, Yu Xia and Junguo Zhang    
Path planning of unmanned aerial vehicles (UAVs) in threatening and adversarial areas is a constrained nonlinear optimal problem which takes a great amount of static and dynamic constraints into account. Quantum-behaved pigeon-inspired optimization (QPIO... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Chunhe Hu, Yu Xia and Junguo Zhang    
Path planning of unmanned aerial vehicles (UAVs) in threatening and adversarial areas is a constrained nonlinear optimal problem which takes a great amount of static and dynamic constraints into account. Quantum-behaved pigeon-inspired optimization (QPIO... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Raz Lapid, Zvika Haramaty and Moshe Sipper    
Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating advers... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Dapeng Lang, Deyun Chen, Jinjie Huang and Sizhao Li    
Small perturbations can make deep models fail. Since deep models are widely used in face recognition systems (FRS) such as surveillance and access control, adversarial examples may introduce more subtle threats to face recognition systems. In this paper,... ver más
Revista: Algorithms    Formato: Electrónico

 
en línea
Shucong Liu, Hongjun Wang and Xiang Zhang    
In gas turbine rotor systems, an intelligent data-driven fault diagnosis method is an important means to monitor the health status of the gas turbine, and it is necessary to obtain sufficient fault data to train the intelligent diagnosis model. In the ac... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yule Chen, Hong Liang and Shuo Pang    
Underwater target classification methods based on deep learning suffer from obvious model overfitting and low recognition accuracy in the case of small samples and complex underwater environments. This paper proposes a novel classification network (Effic... ver más
Revista: Journal of Marine Science and Engineering    Formato: Electrónico

 
en línea
Huayu Li,Dmitry Namiot     Pág. 9 - 16
This article provides a detailed survey of the so-called adversarial attacks and defenses. These are special modifications to the input data of machine learning systems that are designed to cause machine learning systems to work incor... ver más
Revista: International Journal of Open Information Technologies    Formato: Electrónico

 
en línea
Manuel Domínguez-Rodrigo, Ander Fernández-Jaúregui, Gabriel Cifuentes-Alcobendas and Enrique Baquedano    
Deep learning models are based on a combination of neural network architectures, optimization parameters and activation functions. All of them provide exponential combinations whose computational fitness is difficult to pinpoint. The intricate resemblanc... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Jeiyoon Park, Chanhee Lee, Chanjun Park, Kuekyeng Kim and Heuiseok Lim    
Despite its significant effectiveness in adversarial training approaches to multidomain task-oriented dialogue systems, adversarial inverse reinforcement learning of the dialogue policy frequently fails to balance the performance of the reward estimator ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Meng Bi, Xianyun Yu, Zhida Jin and Jian Xu    
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints. A thorough, objective account of the IG-UAP metho... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Danilo Pau, Andrea Pisani and Antonio Candelieri    
In the context of TinyML, many research efforts have been devoted to designing forward topologies to support On-Device Learning. Reaching this target would bring numerous advantages, including reductions in latency and computational complexity, stronger ... ver más
Revista: Algorithms    Formato: Electrónico

« Anterior     Página: 1 de 2     Siguiente »