|
|
|
Valeria Mercuri, Martina Saletta and Claudio Ferretti
As the prevalence and sophistication of cyber threats continue to increase, the development of robust vulnerability detection techniques becomes paramount in ensuring the security of computer systems. Neural models have demonstrated significant potential...
ver más
|
|
|
|
|
|
William Margerit, Antoine Charpentier, Cathy Maugis-Rabusseau, Johann Christian Schön, Nathalie Tarrat and Juan Cortés
The exploration of the energy landscape of a chemical system is essential for understanding and predicting its observable properties. In most cases, this is a challenging task due to the high complexity of such landscapes, which often consist of multiple...
ver más
|
|
|
|
|
|
Andrés F. Ochoa-Muñoz and Javier E. Contreras-Reyes
Missing or unavailable data (NA) in multivariate data analysis is often treated with imputation methods and, in some cases, records containing NA are eliminated, leading to the loss of information. This paper addresses the problem of NA in multiple facto...
ver más
|
|
|
|
|
|
Miglena N. Koleva and Lubin G. Vulkov
The retrospective inverse problem for evolution equations is formulated as the reconstruction of unknown initial data by a given solution at the final time. We consider the inverse retrospective problem for a one-dimensional parabolic equation in two dis...
ver más
|
|
|
|
|
|
Yi Wang, Yating Xu, Tianjian Li, Tao Zhang and Jian Zou
Image deblurring based on sparse regularization has garnered significant attention, but there are still certain limitations that need to be addressed. For instance, convex sparse regularization tends to exhibit biased estimation, which can adversely impa...
ver más
|
|
|