Zobrazeno 1 - 10
of 662
pro vyhledávání: '"LI Shenghong"'
Autor:
Ma Peihong, Qu Yuzhu, Yin Tao, He Zhaoxuan, Cheng Shirui, Teng Yuke, Xie Kunnan, Li Shenghong, Sun Ruirui, Zeng Fang
Publikováno v:
Frontiers in Neuroscience, Vol 15 (2021)
With the development of real-time and visualized neuroimaging techniques, the studies on the central mechanism of acupuncture analgesia gain increasing attention. The experimental pain models have been widely used in acupuncture-analgesia neuroimagin
Externí odkaz:
https://doaj.org/article/f97715805baa42ad803696d4c6eecf5f
Backdoor attacks have emerged as an urgent threat to Deep Neural Networks (DNNs), where victim DNNs are furtively implanted with malicious neurons that could be triggered by the adversary. To defend against backdoor attacks, many works establish a st
Externí odkaz:
http://arxiv.org/abs/2306.08009
Deep Neural Networks (DNNs) are vulnerable to adversarial examples, while adversarial attack models, e.g., DeepFool, are on the rise and outrunning adversarial example detection techniques. This paper presents a new adversarial example detector that
Externí odkaz:
http://arxiv.org/abs/2305.03173
Adversarial attacks and defenses in machine learning and deep neural network have been gaining significant attention due to the rapidly growing applications of deep learning in the Internet and relevant scenarios. This survey provides a comprehensive
Externí odkaz:
http://arxiv.org/abs/2303.06302
Autor:
Li, Kai, Cui, Yingping, Li, Weicai, Lv, Tiejun, Yuan, Xin, Li, Shenghong, Ni, Wei, Simsek, Meryem, Dressler, Falko
In recent years, the Internet of Things (IoT) is studied in the context of the Metaverse to provide users immersive cyber-virtual experiences in mixed reality environments. This survey introduces six typical IoT applications in the Metaverse, includi
Externí odkaz:
http://arxiv.org/abs/2208.13501
Typical deep neural network (DNN) backdoor attacks are based on triggers embedded in inputs. Existing imperceptible triggers are computationally expensive or low in attack success. In this paper, we propose a new backdoor trigger, which is easy to ge
Externí odkaz:
http://arxiv.org/abs/2208.09336
Autor:
Deng Lei, Li Shenghong
Publikováno v:
International Journal of Mathematics and Mathematical Sciences, Vol 24, Iss 1, Pp 49-53 (2000)
We shall consider the behaviour of Ishikawa iteration with errors in a uniformly convex Banach space. Then we generalize the two theorems of Tan and Xu without the restrictions that C is bounded and limsupnsn
Externí odkaz:
https://doaj.org/article/4043124bffdc42728280b7212daa8e1a
Autor:
Ahmedt-Aristizabal, David, Nguyen, Chuong, Tychsen-Smith, Lachlan, Stacey, Ashley, Li, Shenghong, Pathikulangara, Joseph, Petersson, Lars, Wang, Dadong
Publikováno v:
Volume 232, April 2023, 107451
Advanced artificial intelligence and machine learning have great potential to redefine how skin lesions are detected, mapped, tracked and documented. Here, We propose a 3D whole-body imaging system known as 3DSkin-mapper to enable automated detection
Externí odkaz:
http://arxiv.org/abs/2205.07085
Publikováno v:
In Sensors and Actuators: B. Chemical 1 November 2024 418
Publikováno v:
In Computers and Electronics in Agriculture October 2024 225