UNI-MB - logo
UMNIK - logo
 

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources UM. For full access, REGISTER.

47 48 49 50
hits: 654,727
481.
  • Graph Learning: A Survey Graph Learning: A Survey
    Xia, Feng; Sun, Ke; Yu, Shuo ... IEEE transactions on artificial intelligence, 2021-April, 2021-4-00, Volume: 2, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Graphs are widely used as a popular representation of the network structure of connected data. Graph data can be found in a broad spectrum of application domains such as social systems, ecosystems, ...
Full text

PDF
482.
  • Adversarial Machine Learnin... Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
    Adesina, Damilola; Hsieh, Chung-Chu; Sagduyu, Yalin E. ... IEEE Communications surveys and tutorials, 2023-Firstquarter, 2023-00-00, 20230101, Volume: 25, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    Machine learning (ML) provides effective means to learn from spectrum data and solve complex tasks involved in wireless communications. Supported by recent advances in computational resources and ...
Full text
483.
  • Incompleteness of Atomic St... Incompleteness of Atomic Structure Representations
    Pozdnyakov, Sergey N.; Willatt, Michael J.; Bartók, Albert P. ... Physical review letters, 10/2020, Volume: 125, Issue: 16
    Journal Article
    Peer reviewed
    Open access

    Many-body descriptors are widely used to represent atomic environments in the construction of machine-learned interatomic potentials and more broadly for fitting, classification, and embedding tasks ...
Full text

PDF
484.
  • Hardening machine learning ... Hardening machine learning denial of service (DoS) defences against adversarial attacks in IoT smart home networks
    Anthi, Eirini; Williams, Lowri; Javed, Amir ... Computers & security, September 2021, 2021-09-00, 20210901, Volume: 108
    Journal Article
    Peer reviewed
    Open access

    Machine learning based Intrusion Detection Systems (IDS) allow flexible and efficient automated detection of cyberattacks in Internet of Things (IoT) networks. However, this has also created an ...
Full text

PDF
485.
  • Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning
    Jagielski, Matthew; Oprea, Alina; Biggio, Battista ... 2018 IEEE Symposium on Security and Privacy (SP), 05/2018
    Conference Proceeding
    Open access

    As machine learning becomes widely used for automated decisions, attackers have strong incentives to manipulate the results and models generated by machine learning algorithms. In this paper, we ...
Full text

PDF
486.
Full text
487.
  • Unsupervised K-Means Cluste... Unsupervised K-Means Clustering Algorithm
    Sinaga, Kristina P.; Yang, Miin-Shen IEEE access, 2020, Volume: 8
    Journal Article
    Peer reviewed
    Open access

    The k-means algorithm is generally the most known and used clustering method. There are various extensions of k-means to be proposed in the literature. Although it is an unsupervised learning to ...
Full text

PDF
488.
  • ENCFIS: An Exclusionary Neu... ENCFIS: An Exclusionary Neural Complex Fuzzy Inference System for Robust Regression Learning
    Xue, Chuan; Mahfouf, Mahdi IEEE transactions on fuzzy systems, 2024-March, 2024-3-00, Volume: 32, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Robust learning, an emerging research topic in recent years, is a promising branch of advanced artificial intelligence. Robust learning models target mainly noisy and rough datasets, predominantly in ...
Full text
489.
  • An introduction to quantum ... An introduction to quantum machine learning
    Schuld, Maria; Sinayskiy, Ilya; Petruccione, Francesco Contemporary physics, 04/2015, Volume: 56, Issue: 2
    Journal Article
    Peer reviewed
    Open access

    Machine learning algorithms learn a desired input-output relation from examples in order to interpret new inputs. This is important for tasks such as image and speech recognition or strategy ...
Full text

PDF
490.
  • Two distinct neuroanatomica... Two distinct neuroanatomical subtypes of schizophrenia revealed using machine learning
    Chand, Ganesh B; Dwyer, Dominic B; Erus, Guray ... Brain (London, England : 1878), 03/2020, Volume: 143, Issue: 3
    Journal Article
    Peer reviewed
    Open access

    Neurobiological heterogeneity in schizophrenia is poorly understood and confounds current analyses. We investigated neuroanatomical subtypes in a multi-institutional multi-ethnic cohort, using novel ...
Full text

PDF
47 48 49 50
hits: 654,727

Load filters