Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (2)
  • Open Access

    ARTICLE

    An Improved Optimized Model for Invisible Backdoor Attack Creation Using Steganography

    Daniyal M. Alghazzawi1, Osama Bassam J. Rabie1, Surbhi Bhatia2, Syed Hamid Hasan1,*

    CMC-Computers, Materials & Continua, Vol.72, No.1, pp. 1173-1193, 2022, DOI:10.32604/cmc.2022.022748

    Abstract The Deep Neural Networks (DNN) training process is widely affected by backdoor attacks. The backdoor attack is excellent at concealing its identity in the DNN by performing well on regular samples and displaying malicious behavior with data poisoning triggers. The state-of-art backdoor attacks mainly follow a certain assumption that the trigger is sample-agnostic and different poisoned samples use the same trigger. To overcome this problem, in this work we are creating a backdoor attack to check their strength to withstand complex defense strategies, and in order to achieve this objective, we are developing an improved Convolutional Neural Network (ICNN) model… More >

  • Open Access

    ARTICLE

    Topological Shape Optimization of Electromagnetic Problems using Level Set Method and Radial Basis Function

    Hokyung Shim1, Vinh Thuy Tran Ho1,,Semyung Wang1,2, Daniel A. Tortorelli3

    CMES-Computer Modeling in Engineering & Sciences, Vol.37, No.2, pp. 175-202, 2008, DOI:10.3970/cmes.2008.037.175

    Abstract This paper presents a topological shape optimization technique for electromagnetic problems using a level set method and radial basis functions. The proposed technique is a level set (LS) based optimization dealing with geometrical shape derivatives and topological design. The shape derivative is computed by an adjoint variable method to avoid numerous sensitivity evaluations. A level set model embedded into the scalar function of higher dimensions is propagated to represent the design boundary of a domain. The level set function interpolated into a fixed initial domain is evolved by using the Hamilton-Jacobi equation. The moving free boundaries (dynamic interfaces) represented in… More >

Displaying 1-10 on page 1 of 2. Per Page