Showing 821 - 840 results of 2,913 for search '"The Real World"', query time: 0.11s Refine Results
  1. 821

    Efficient Method for Robust Backdoor Detection and Removal in Feature Space Using Clean Data by Donik Vrsnak, Marko Subasic, Sven Loncaric

    Published 2025-01-01
    “…However, the attacker can exploit these assumptions, which reduces their successfulness in real-world scenarios. Thus, a robust method for backdoor detection needs to have broad and simple assumptions. …”
    Get full text
    Article
  2. 822

    Differences in immune-related toxicity between PD-1 and PD-L1 inhibitors: a retrospective cohort study in patients with advanced cancer by Cecilia Olsson Ladjevardi, Marcus Skribek, Anthoula Koliadi, Viktoria Rydén, Ali Inan El-Naggar, Evangelos Digkas, Antonios Valachis, Gustav J. Ullenhag

    Published 2024-11-01
    “…This study aimed to investigate differences in IRAEs between patients with advanced solid malignances treated with PD-L1 and PD-1 inhibitors in a real-world setting. We conducted a retrospective cohort study at four Swedish Regions. …”
    Get full text
    Article
  3. 823

    Anlotinib as Maintenance Therapy After First-Line Chemotherapy Combined with Consolidation Radiation for Extensive-Stage Small Cell Lung Cancer by Jinbo Ma MD, Xiaoyan Ma MS, Wei Zhang MD, Shanliang Hu MS, Rukun Zang MS, Xiaolong Wu MS, Jie Song MD

    Published 2025-01-01
    “…Owing to the small sample size of the real-world trial, the reliability of our study needs to be confirmed in more studies.…”
    Get full text
    Article
  4. 824

    A Survey on Adversarial Attacks for Malware Analysis by Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Pradip Kunwar, Bhavani Thuraisingham

    Published 2025-01-01
    “…The survey highlights real-world adversarial evasion attacks on machine learning-based anti-malware engines under each taxonomical heading, demonstrating the evolution and refinement of these attack strategies over time. …”
    Get full text
    Article
  5. 825
  6. 826

    LDWLE: self-supervised driven low-light object detection framework by Xiaoyang shen, Haibin Li, Yaqian Li, Wenming Zhang

    Published 2024-12-01
    “…In quantitative measurements, it achieves an AP of 25.5 and 38.4 on the synthetic datasets COCO-d and VOC-d, respectively, and achieves the best AP of 30.5 on the real-world dataset ExDark. In qualitative measurements, LDWLE can accurately detect most objects on both public real-world low-light datasets and self-collected ones, demonstrating strong adaptability to varying lighting conditions and multi-scale objects.…”
    Get full text
    Article
  7. 827

    High Frequency Response of Volatile Memristors by Ioannis Messaris, Alon Ascoli, Ahmet S. Demirkol, Vasileios Ntinas, Dimitrios Prousalis, Ronald Tetzlaff

    Published 2024-12-01
    “…Abstract In this theoretical study, the high‐frequency response of the electrothermal NbO2‐Mott threshold switch is focused, a real‐world electronic device, which has been proved to be relevant in several applications and is classified as a volatile memristor. …”
    Get full text
    Article
  8. 828

    Existence of solutions for asymptotically periodic quasilinear Schrödinger equations with local nonlinearities by Jianxin Han, Yuting Wei, Yanfang Xue

    Published 2024-04-01
    “…By using a Nehari-type constraint and Moser iteration, we get the existence results which is a complement to the ones in Chu and Liu [Nonlinear Anal. Real World Appl. 44(2018), 118–127]. Moreover, we consider a new reformative asymptotic processes of the potential function and the nonlinearity term is only locally defined.…”
    Get full text
    Article
  9. 829

    Metaheuristics for a Large-Scale Vehicle Routing Problem of Same-Day Delivery in E-Commerce Logistics System by Yi Tao, Changhui Lin, Lijun Wei

    Published 2022-01-01
    “…The proposed method is tested on a large family of instances, including real-world data collected from JD.com, and the effectiveness of the VNS algorithm and also the algorithm components are analyzed.…”
    Get full text
    Article
  10. 830

    Advancing the Understanding of Accountability Processes in Collaborative Governance: Lessons from Research on ‘Agencification’ by Yannis Papadopoulos

    Published 2024-09-01
    “…Policy-makers’ strategies for avoiding accountability have been emphasized, but to advance the understanding of real-world accountability processes, we must consider that control deficits can be caused by the passivity of accountability ‘forums’, while policy-makers may find their accountability valuable.…”
    Get full text
    Article
  11. 831

    Cardinality-constrained structured data-fitting problems by Fan, Zhenan, Fang, Huang, Friedlander, Michael P.

    Published 2024-05-01
    “…Numerical experiments on real-world datasets support the analysis and demonstrate the efficiency of the proposed approach.…”
    Get full text
    Article
  12. 832

    User role analysis method based on directed topological potential by Song-qing DUAN, Xing-long YU, Bin WU, Bai WANG

    Published 2014-12-01
    “…The majority of real-world networks are directed,weighted and dynamic.Aiming at the problem of node role analysis in directed weighted network,a novel node role analysis method based on directed topological potential is pro-posed,which can divide nodes into four roles based on their behavior pattern and local influence.Then,a node role-based dynamic networks evolution analysis method is introduced,which can model the dynamics of behavioral roles represent-ing the main connectivity patterns over time and detect the significant event.The experiment results indicate that pro-posed approaches can effectively estimate the node role and detect the dynamics of network evolution.…”
    Get full text
    Article
  13. 833

    Analysis and Semantic Mining in Heterogeneous Information Network by Rui Wang, Zhiqiang Zhang, Chuan Shi

    Published 2015-07-01
    “…Heterogeneous information network(HIN),which is composed of different types of objects and links,has gradually become a hot topic in social network analysis.As a unique characteristic of HIN,meta path contains rich semantic information.Heterogeneous information network with values on links are ubiquitous in real world.Therefore,the traditional meta path,which doesn’t consider weight on links,can not exactly capture semantics in many cases.Related concepts of HIN were introduced and a brief introduction of applications of HIN was given.Then subtle semantic information in HIN was explored by extending the traditional meta path to weighted meta path.Experiments on two real data sets demonstrate the applications of the weighted meta path in recommendation,relevance search.…”
    Get full text
    Article
  14. 834

    Byzantine-robust federated learning over Non-IID data by Xindi MA, Qinghua LI, Qi JIANG, Zhuo MA, Sheng GAO, Youliang TIAN, Jianfeng MA

    Published 2023-06-01
    “…The malicious attacks of Byzantine nodes in federated learning was studied over the non-independent and identically distributed dataset , and a privacy protection robust gradient aggregation algorithm was proposed.A reference gradient was designed to identify “poor quality” shared gradients in model training, and the influence of heterogeneity data on Byzantine node recognition was reduced by reputation evaluation.Meanwhile, the combination of homomorphic encryption and random noise obfuscation technology was introduced to protect user privacy in the process of model training and Byzantine node recognition.Finally, through the evaluation over the real-world datasets, the simulation results show that the proposed algorithm can accurately and efficiently identify Byzantine attack nodes while protecting user privacy and has good convergence and robustness.…”
    Get full text
    Article
  15. 835

    Global efficiency estimation method of complex network based on fractal property by Sheng ZHANG, Weikai DAI, Feng WU, Wenxiang LAN

    Published 2020-07-01
    “…A method of network efficiency estimation based on fractal property was proposed for solving the problems of high complexity and time-consuming calculation of efficiency in large scale networks.Considering the fractal properties of complex network topology,the relationship between network efficiency and node correlation sum was analyzed,and the global network efficiency was estimated by partial nodes.Besides,to rapidly find the fractal properties of complex networks,a fractal property discrimination method based on node correlation sum was proposed.The experimental analysis in the construction network and the real-world network show that the proposed method can accurately and effectively estimate the global efficiency of the network,which reduces the calculation time by at least 90% compared with the original method.…”
    Get full text
    Article
  16. 836

    Homology analysis of malware based on graph by Bing-lin ZHAO, Xi MENG, Jin HAN, Jing WANG, Fu-dong LIU

    Published 2017-11-01
    “…Malware detection and homology analysis has been the hotspot of malware analysis.API call graph of malware can represent the behavior of it.Because of the subgraph isomorphism algorithm has high complexity,the analysis of malware based on the graph structure with low efficiency.Therefore,this studies a homology analysis method of API graph of malware that use convolutional neural network.By selecting the key nodes,and construct neighborhood receptive field,the convolution neural network can handle graph structure data.Experimental results on 8 real-world malware family,shows that the accuracy rate of homology malware analysis achieves 93%,and the accuracy rate of the detection of malicious code to 96%.…”
    Get full text
    Article
  17. 837

    An insight into the stochastic solitonic features of the Maccari model using the solver technique. by Hesham G Abdelwahed, Reem Alotaibi, Emad K El-Shewy, Mahmoud A E Abdelrahman

    Published 2024-01-01
    “…We noticed that our results may be useful for solving some real-world physical issues by identifying the motion of an isolated wave in a small area.…”
    Get full text
    Article
  18. 838

    Research on the performance of MAC protocols in UWB-ad hoc system by YUE Ran1, WU Wei-qiang2, ZHANG Qin-yu 2, ZHANG Nai-tong 1

    Published 2007-01-01
    “…In general,QoS guarantee is the basic element for a communication system in the real world.Accordingly,the relationship between transmission power and SINR was investigated,as well as the relationship between SINR and data rate.And different QoS requirements correspond to various applications.Then a MAC protocol,named TDQG was presented based on TH-UWB-ad hoc system,which can guarantee QoS requirements in term of material traffics.TDQG reserves resource to the potential links to accommodate the distributed character of ad hoc network,and dynamically assigns the resource to make the best of it.A mass of simulation results gave more proves to the superiority of TDQG in UWB-ad hoc system.…”
    Get full text
    Article
  19. 839

    Online analytical model of massive malware based on feature clusting by Xiao-lin XU, Xiao-chun YUN, Yong-lin ZHOU, Xue-bin KANG

    Published 2013-08-01
    “…In order to improve the effectiveness and efficiency of mass malicious code analysis,an online analytical model was proposed including feature space construction,automatic feature extraction and fast clustering.Our research focused on the law of malware behavior and code string distribution by dynamic and static techniques.In this model,a sample was described with its API and key code fragment.This model proposed a fast clustering approach to identify group samples that exhibit similar feature when applied this model to real-world malware collections.The result demonstrates that the proposed model is able to extract feature automatically,support streaming data clustering on large-scale,and achieve better precision.…”
    Get full text
    Article
  20. 840

    A Hot-Area-Based Selfish Routing Protocol for Mobile Social Networks by Haigang Gong, Xiaomin Wang

    Published 2013-01-01
    “…However, existing routing schemes seldom consider selfishness of nodes and assume that nodes are willing to forward messages for others. In the real world, most people are selfish and nodes attached to people behave selfishly too. …”
    Get full text
    Article