Zobrazeno 1 - 10
of 1 835
pro vyhledávání: '"Tang Long"'
With the development of artificial intelligence, neural networks play a key role in network intrusion detection systems (NIDS). Despite the tremendous advantages, neural networks are susceptible to adversarial attacks. To improve the reliability of N
Externí odkaz:
http://arxiv.org/abs/2409.12472
Autor:
Tang Long, Vumar Elkin
Publikováno v:
Discussiones Mathematicae Graph Theory, Vol 40, Iss 1, Pp 77-84 (2020)
Let 𝒫 be a property of a graph. A graph G is said to be locally 𝒫, if the subgraph induced by the open neighbourhood of every vertex in G has property 𝒫. Ryjáček conjectures that every connected, locally connected graph is weakly pancyclic
Externí odkaz:
https://doaj.org/article/dfd2039c420841d692e19e0fe5141083
Autor:
Zhang, Yunming, Ye, Dengpan, Xie, Caiyun, Shen, Sipeng, Liu, Ziyi, Deng, Jiacheng, Tang, Long
The wide deployment of Face Recognition (FR) systems poses privacy risks. One countermeasure is adversarial attack, deceiving unauthorized malicious FR, but it also disrupts regular identity verification of trusted authorizers, exacerbating the poten
Externí odkaz:
http://arxiv.org/abs/2404.14693
Autor:
Carolina Soekmadji, Bo Li, Yiyao Huang, Haifang Wang, Taixue An, Chunchen Liu, Weilun Pan, Jing Chen, Lesley Cheung, Juan Manuel Falcon-Perez, Yong Song Gho, Harry B. Holthofer, Minh T. N. Le, Antonio Marcilla, Lorraine O’Driscoll, Faezeh Shekari, Tang Long Shen, Ana Claudia Torrecilhas, Xiaomei Yan, Fuquan Yang, Hang Yin, Yu Xiao, Zezhou Zhao, Xue Zou, Qian Wang, Lei Zheng
Publikováno v:
Journal of Extracellular Vesicles, Vol 9, Iss 1 (2020)
The utilization of extracellular vesicles (EVs) in clinical theranostics has rapidly advanced in the past decade. In November 2018, the International Society for Extracellular Vesicles (ISEV) held a workshop on “EVs in Clinical Theranostic”. Here
Externí odkaz:
https://doaj.org/article/263ca225604b4e7e8d175495127a08a8
With the continuous improvements of deepfake methods, forgery messages have transitioned from single-modality to multi-modal fusion, posing new challenges for existing forgery detection algorithms. In this paper, we propose AVT2-DWF, the Audio-Visual
Externí odkaz:
http://arxiv.org/abs/2403.14974
Autor:
Zhang, Yunming, Ye, Dengpan, Xie, Caiyun, Tang, Long, Chen, Chuanxi, Liu, Ziyi, Deng, Jiacheng
The malicious applications of deep forgery, represented by face swapping, have introduced security threats such as misinformation dissemination and identity fraud. While some research has proposed the use of robust watermarking methods to trace the c
Externí odkaz:
http://arxiv.org/abs/2310.16540
Adversarial example is a rising way of protecting facial privacy security from deepfake modification. To prevent massive facial images from being illegally modified by various deepfake models, it is essential to design a universal deepfake disruptor.
Externí odkaz:
http://arxiv.org/abs/2303.00200
Autor:
Tang, Long1,2 (AUTHOR), Tu, Shihao1,2 (AUTHOR) tsh@cumt.edu.cn, Tu, Hongsheng1,2 (AUTHOR), Zhang, Lei1,3 (AUTHOR), Miao, Kaijun1,2 (AUTHOR), Zhao, Hongbin1,2 (AUTHOR), Ma, Jieyang1,2 (AUTHOR)
Publikováno v:
Scientific Reports. 10/27/2024, Vol. 14 Issue 1, p1-20. 20p.
Publikováno v:
SciPost Phys. 15, 030 (2023)
Central spin models provide an idealized description of interactions between a central degree of freedom and a mesoscopic environment of surrounding spins. We show that the family of models with a spin-1 at the center and XX interactions of arbitrary
Externí odkaz:
http://arxiv.org/abs/2212.04477
Publikováno v:
Zeitschrift für Kristallographie - New Crystal Structures, Vol 228, Iss 2, Pp 295-297 (2013)
C36H45N3O24S3Tb, triclinic, P1¯ (no. 2), a = 10.0869(7) Å, b = 13.7894(8) Å, c = 17.6966(8) Å, α = 69.366(4)°, β = 74.359(5)°, γ = 85.267(6)°, V = 2218.0 Å3, Z = 2, Rgt(F) = 0.0369, wRref(F2) = 0.0817, T = 273 K.
Externí odkaz:
https://doaj.org/article/09c4998df55f40ccbb92bba46cbc2695