-
941
Myriad of Traumatic Oral Soft Tissue Pathologies: A 12-Year Histopathological Experience
Published 2025-07-01Get full text
Article -
942
Detecting Online Sexism: Integrating Sentiment Analysis with Contextual Language Models
Published 2024-12-01“…Nevertheless, detecting and preventing sexism on social networks remains a critical issue. Recent studies have leveraged language models such as transformers, known for their ability to capture the semantic nuances of textual data. …”
Get full text
Article -
943
A hybrid blockchain-based solution for secure sharing of electronic medical record data
Published 2025-01-01Get full text
Article -
944
-
945
Treatment Strategies for Distal Clavicle Fractures: A Narrative Review
Published 2025-05-01Get full text
Article -
946
ML-CKDP: Machine learning-based chronic kidney disease prediction with smart web application
Published 2024-12-01“…Chronic kidney diseases (CKDs) are a significant public health issue with potential for severe complications such as hypertension, anemia, and renal failure. …”
Get full text
Article -
947
Data-Driven Control Design for Complex Systems: Theory, Challenges, and Novel Applications
Published 2025-02-01Get full text
Article -
948
The Application of Evidence Theory in Supplier Evaluation
Published 2017-12-01Get full text
Article -
949
-
950
-
951
G&G Attack: General and Geometry-Aware Adversarial Attack on the Point Cloud
Published 2025-01-01Get full text
Article -
952
Enhancing credit card fraud detection: highly imbalanced data case
Published 2024-12-01“…This paper emphasizes the main issues in fraud detection and suggests a novel feature selection method called FID-SOM (feature selection for imbalanced data using SOM). …”
Get full text
Article -
953
Learning spatial‐frequency interaction for generalizable deepfake detection
Published 2024-12-01Get full text
Article -
954
-
955
Adversarial example defense algorithm for MNIST based on image reconstruction
Published 2022-02-01“…With the popularization of deep learning, more and more attention has been paid to its security issues.The adversarial sample is to add a small disturbance to the original image, which can cause the deep learning model to misclassify the image, which seriously affects the performance of deep learning technology.To address this challenge, the attack form and harm of the existing adversarial samples were analyzed.An adversarial examples defense method based on image reconstruction was proposed to effectively detect adversarial examples.The defense method used MNIST as the test data set.The core idea was image reconstruction, including central variance minimization and image quilting optimization.The central variance minimization was only processed for the central area of the image.The image quilting optimization incorporated the overlapping area into the patch block selection.Considered and took half the size of the patch as the overlap area.Using FGSM, BIM, DeepFool and C&W attack methods to generate adversarial samples to test the defense performance of the two methods, and compare with the existing three image reconstruction defense methods (cropping and scaling, bit depth compression and JPEG compression).The experimental results show that the central variance minimization and image quilting optimization algorithms proposed have a satisfied defense effect against the attacks of existing common adversarial samples.Image quilting optimization achieves over 75% classification accuracy for samples generated by the four attack algorithms, and the defense effect of minimizing central variance is around 70%.The three image reconstruction algorithms used for comparison have unstable defense effects on different attack algorithms, and the overall classification accuracy rate is less than 60%.The central variance minimization and image quilting optimization proposed achieve the purpose of effectively defending against adversarial samples.The experiments illustrate the defense effect of the proposed defense algorithm in different adversarial sample attack algorithms.The comparison between the reconstruction algorithm and the algorithm shows that the proposed scheme has good defense performance.…”
Get full text
Article -
956
A Deep Learning Approach to Unveil Types of Mental Illness by Analyzing Social Media Posts
Published 2025-05-01Get full text
Article -
957
Historical habitat mapping from black-and-white aerial photography: A proof of concept for post World War II Switzerland
Published 2025-04-01“…Yet, map predictions sometimes varied substantially, indicating that the sampling strategies address different classification issues. Hence, we conclude that combining different sampling strategies for training data collection has the potential to improve the mapping, particularly in the case of multi-class classifications.…”
Get full text
Article -
958
Dynamic clustering of genomics cohorts beyond race, ethnicity—and ancestry
Published 2025-05-01“…For early modern classification systems, data collection was also considerably arbitrary and limited. …”
Get full text
Article -
959
-
960
An Early Detection of Asthma Using BOMLA Detector
Published 2021-01-01“…ADASYN algorithm has also been employed in the BOMLA detector to eradicate the issues created due to the imbalanced dataset. It has even been attempted to delineate how the ADASYN algorithm affects the classification performance. …”
Get full text
Article