Abstract: Deep neural networks yield desirable performance in text, image, and speech classification. However, these networks are vulnerable to adversarial examples. An adversarial example is a sample ...
Abstract: The current automatic speech recognition (ASR) technology has achieved remarkable success, but it is vulnerable to adversarial attacks. To solve the problem that existing adversarial attack ...
The purpose of this repository is to provide a few sample prompts used in order to create a simple Python GUI for the Linux desktop project. I created this repository and wrote these prompts on March ...
The MMA algorithm is used largely in the topology optimization field. Here we have a python implementation of the algorithm. To understand the API, kindly see mma_test.py. If you use this code in your ...
Polymersomes are nanometric vesicles that can encapsulate large and hydrophilic biomolecules, such as proteins, in the aqueous core. Data in literature show large variation in encapsulation efficiency ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results