Abstract: Much current work has shown that adversarial samples generated on one model can achieve good attack success on other models as well, which has attracted a lot of attention. Enhancing ...
The object of this work is to describe how to implement the differential ‎transformation method (DTM) for finding exact and approximate solutions of ‎the second-order random differential equations. To ...
WHEN a practical man devotes himself to the task of explaining to others the difficulties of any specialised subject on which he has been engaged for many years, the result is likely to be ...
Abstract: Deep learning has revolutionized image recognition. One significant obstacle still remains, the vulnerability of these models to adversarial attacks. These attacks manipulate images with ...
The choice of non-linear transformations in the analysis of data can frequently be simplified by restricting the possible transformations to a particular family. Tukey has shown that the "simple ...
A general method for the gram scale resolution of 2-substituted and 2,8-disubstituted Tröger’s base (TB) derivatives in 63–91% yield has been achieved through the application of ...