Showing Results for
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedAdversarial examples are regarded as a security threat to deep learning models, and there are many ways to generate them. However, most existing methods require the query authority of the target during their work. In a...
From:PeerJ Computer Science (Vol. 7) Peer-ReviewedIn dentistry, practitioners interpret various dental X-ray imaging modalities to identify tooth-related problems, abnormalities, or teeth structure changes. Another aspect of dental imaging is that it can be helpful in...
Choose how you want to be alerted when new results for your search become available.
Subscribe to Gale's RSS feed to get content delivered to your favorite RSS aggregator. Copy and paste the URL below into your reader:
Tell us where to send the alert and how often you want to receive it