A sprawling Chinese influence operation — accidentally revealed by a Chinese law enforcement official’s use of ChatGPT — focused on intimidating Chinese dissidents abroad, including by impersonating ...
Top United States artificial intelligence firm Anthropic is accusing three prominent Chinese AI labs of illegally extracting capabilities from its Claude model to advance their own, claiming it raises ...
Over the past week, a slew of cinematic videos of celebrities and characters in absurd situations have gone viral online, with one commonality –– they were created using a new artificial intelligence ...
Kronos is the first open-source foundation model for financial candlesticks (K-lines), trained on data from over 45 global exchanges. Kronos is a family of decoder-only foundation models, pre-trained ...
Abstract: Oil and gas distribution through undersea pipelines requires continuous monitoring, especially when transmitting these resources through undersea pipelines, as operational failures can lead ...
Abstract: Olfactory perception prediction plays a vital role in multi-modal sensory research, offering insights for health monitoring and personalized experiences. In this work, we propose a novel CNN ...
Abstract: This paper proposes a photovoltaic power prediction model based on GWO-CNN-LSTM-MATT. Firstly, the convolutional neural network (CNN) is used to extract the spatial features and local ...
Abstract: With the increasing penetration of renewable energy in power systems, load forecasting faces dual challenges of modeling non-stationary fluctuations and spatiotemporally coupled features.
Abstract: Coal mining operations trigger geological hazards including ground subsidence, surface fracturing, and landslides, endangering resident safety and infrastructure in mining regions. To ...
Abstract: The remarkable success of Transformer architectures in Natural Language Processing (NLP) has led to increased demand for embedded systems capable of efficiently handling NLP tasks along with ...
Abstract: Due to its adaptability and pay-as-you-go pricing model, cloud computing has quickly become the go-to option for all types of IT companies. The majority of cloud intrusion detection systems ...
Abstract: We implement transfer learning (TL) to attain efficiency in training and feature extraction by freezing the connection weights of shallow layers of deep learning (DL) models, already trained ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results