Skip Content
You are currently on the new version of our website. Access the old version .

277 Results Found

  • Article
  • Open Access
22 Citations
4,846 Views
18 Pages

20 December 2021

The evaluation of corporation operation efficiency (especially innovation efficiency) has been always a hot topic. The currently popular evaluation methods are data envelopment analysis (DEA) and its improved methods. However, these methods have the...

  • Article
  • Open Access
13 Citations
3,475 Views
20 Pages

11 January 2021

The kriging optimization method that can only obtain one sampling point per cycle has encountered a bottleneck in practical engineering applications. How to find a suitable optimization method to generate multiple sampling points at a time while impr...

  • Article
  • Open Access
1 Citations
977 Views
18 Pages

Current–Pressure Dynamics Modeling on an Annular Magnetorheological Valve for an Adaptive Rehabilitation Device for Disabled Individuals

  • Fitrian Imaduddin,
  • Zaenal Arifin,
  • Ubaidillah,
  • Essam Rabea Ibrahim Mahmoud and
  • Abdulrahman Aljabri

26 January 2025

The dynamic relationship between current and pressure in magnetorheological (MR) valves is essential for the design of adaptive rehabilitation devices aimed at health rehabilitation for disabled individuals, yet it remains under-explored in existing...

  • Article
  • Open Access
1,614 Views
22 Pages

30 July 2025

In the context of algorithm selection, the careful design of benchmark functions and problem instances plays a pivotal role in evaluating the performance of optimization methods. Traditional benchmark functions have been criticized for their limited...

  • Article
  • Open Access
6 Citations
4,162 Views
16 Pages

29 October 2021

Black pepper (Piper nigrum L.), is dubbed “the King of Spices”. However, the lack of genic knowledge has limited the understanding of its physiological processes and hindered the development of its molecular breeding. The SBP-box gene fam...

  • Article
  • Open Access
2,965 Views
22 Pages

Unpacking the Black Box: How AI Capability Enhances Human Resource Functions in China’s Healthcare Sector

  • Xueru Chen,
  • Maria Pilar Martínez-Ruiz,
  • Elena Bulmer and
  • Benito Yáñez-Araque

19 August 2025

Artificial intelligence (AI) is transforming organizational functions across sectors; however, its application to human resource management (HRM) within healthcare remains underexplored. This study aims to unpack the black-box nature of AI capability...

  • Article
  • Open Access
4 Citations
2,256 Views
13 Pages

On Solving the Problem of Finding Kinetic Parameters of Catalytic Isomerization of the Pentane-Hexane Fraction Using a Parallel Global Search Algorithm

  • Konstantin Barkalov,
  • Irek Gubaydullin,
  • Evgeny Kozinov,
  • Ilya Lebedev,
  • Roza Faskhutdinova,
  • Azamat Faskhutdinov and
  • Leniza Enikeeva

6 October 2022

This article is devoted to the problem of developing a kinetic model of a complex chemical reaction using a parallel optimization method. The design of the kinetic model consists of finding the kinetic parameters of the reaction, which cannot be calc...

  • Article
  • Open Access
1 Citations
6,500 Views
9 Pages

17 October 2014

Recently, intelligent transport systems have been applied to vehicle cloud environments. Such technology is especially useful for the systematic management of road traffic. Moreover, automobiles are increasingly equipped with a black box for accident...

  • Article
  • Open Access
5 Citations
2,894 Views
14 Pages

A General-Purpose Multi-Dimensional Convex Landscape Generator

  • Wenwen Liu,
  • Shiu Yin Yuen,
  • Kwok Wai Chung and
  • Chi Wan Sung

26 October 2022

Heuristic and evolutionary algorithms are proposed to solve challenging real-world optimization problems. In the evolutionary community, many benchmark problems for empirical evaluations of algorithms have been proposed. One of the most important cla...

  • Article
  • Open Access
501 Views
29 Pages

9 January 2026

This paper presents an Interoperable User-Centred Digital Twin (I-UCDT) framework for sustainable energy system management, addressing the growing complexity of energy generation, storage, demand, and grid interaction across industrial and community-...

  • Article
  • Open Access
22 Citations
5,241 Views
13 Pages

24 May 2021

The selection of the hyper-parameters plays a critical role in the task of prediction based on the recurrent neural networks (RNN). Traditionally, the hyper-parameters of the machine learning models are selected by simulations as well as human experi...

  • Article
  • Open Access
2,000 Views
25 Pages

Machine learning research focuses on the improvement of prediction performance. Progress was made with black-box models that flexibly adapt to the given data. However, due to their increased complexity, black-box models are more difficult to interpre...

  • Article
  • Open Access
8 Citations
2,228 Views
19 Pages

1 January 2023

In order to overcome the drawbacks of expensive function evaluation in the practical reliability-based design optimization (RBDO) problem, researchers have proposed the black box-based RBDO method. The algorithm flow of the commonly employed RBDO met...

  • Article
  • Open Access
11 Citations
4,114 Views
23 Pages

This paper presents a novel on-the-fly, black-box, property-checking through learning approach as a means for verifying requirements of recurrent neural networks (RNN) in the context of sequence classification. Our technique steps on a tool for learn...

  • Article
  • Open Access
13 Citations
2,808 Views
25 Pages

HBIM Meta-Modelling: 50 (and More) Shades of Grey

  • Martina Attenni,
  • Carlo Bianchini,
  • Marika Griffo and
  • Luca James Senatore

The paper aims at investigating modelling strategies in HBIM context to identify at what extent the final use of the model might affects, or should affect, the modelling approach itself. Moreover, the discussion wants to shed light on the possibility...

  • Article
  • Open Access
2 Citations
2,176 Views
14 Pages

Efficient Adversarial Attack Based on Moment Estimation and Lookahead Gradient

  • Dian Hong,
  • Deng Chen,
  • Yanduo Zhang,
  • Huabing Zhou,
  • Liang Xie,
  • Jianping Ju and
  • Jianyin Tang

Adversarial example generation is a technique that involves perturbing inputs with imperceptible noise to induce misclassifications in neural networks, serving as a means to assess the robustness of such models. Among the adversarial attack algorithm...

  • Article
  • Open Access
1,194 Views
25 Pages

8 July 2025

Generating adversarial examples under black-box settings poses significant challenges due to the inaccessibility of internal model information. This complexity is further exacerbated when attempting to achieve a balance between the attack success rat...

  • Article
  • Open Access
1 Citations
1,117 Views
22 Pages

From Black Box to Transparency: The Impact of Multi-Level Visualization on User Trust in Autonomous Driving

  • Mengniu Li,
  • Ming Zhou,
  • Yajun Li,
  • Wentao Wei,
  • Tianlu Zhu,
  • Xun Xu,
  • Linyan Ren,
  • Nuowen Zhang,
  • Renhan Xu and
  • Jinye Li

3 November 2025

Autonomous systems’ “black-box” nature impedes user trust and adoption. To investigate explainable visualizations’ impact on trust and cognitive states, we conducted a within-subjects study with 29 participants performing high...

  • Article
  • Open Access
5 Citations
8,957 Views
11 Pages

One of the most widely used models for specifying functional requirements is a use case model. The viewpoint of the use case model that views a system as a black box focuses on descriptions of external interactions between the system and related envi...

  • Article
  • Open Access
1 Citations
1,265 Views
24 Pages

4 July 2025

Post hoc explanations for black-box machine learning models have been criticized for potentially inaccurate surrogate models and computational burden at prediction time. We propose pre hoc and co hoc explainability frameworks that integrate interpret...

  • Article
  • Open Access
1 Citations
2,074 Views
16 Pages

To address the challenges of black-box video adversarial attacks, such as excessive query times and suboptimal attack performance due to the lack of result feedback during the attack process, we propose a reinforcement learning-based sparse adversari...

  • Article
  • Open Access
7 Citations
4,610 Views
16 Pages

31 October 2022

Deep neural networks (DNNs) are sensitive to adversarial data in a variety of scenarios, including the black-box scenario, where the attacker is only allowed to query the trained model and receive an output. Existing black-box methods for creating ad...

  • Case Report
  • Open Access
3 Citations
4,422 Views
13 Pages

Light and the Brain: A Clinical Case Depicting the Effects of Light on Brainwaves and Possible Presence of Plasma-like Brain Energy

  • Zamzuri Idris,
  • Zaitun Zakaria,
  • Ang Song Yee,
  • Diana Noma Fitzrol,
  • Muhammad Ihfaz Ismail,
  • Abdul Rahman Izaini Ghani,
  • Jafri Malin Abdullah,
  • Mohd Hasyizan Hassan and
  • Nursakinah Suardi

Light is an electromagnetic radiation that has visible and invisible wavelength spectrums. Visible light can only be detected by the eyes through the optic pathways. With the presence of the scalp, cranium, and meninges, the brain is seen as being pr...

  • Article
  • Open Access
13 Citations
2,543 Views
24 Pages

Research on Black-Box Modeling Prediction of USV Maneuvering Based on SSA-WLS-SVM

  • Lifei Song,
  • Le Hao,
  • Hao Tao,
  • Chuanyi Xu,
  • Rong Guo,
  • Yi Li and
  • Jianxi Yao

Unmanned surface vessels (USVs) are required to perform motion prediction during a task. This is essential for USVs, especially when conducting motion control, and this work has been proven to be complicated. In this paper, an off-line black box mode...

  • Article
  • Open Access
5 Citations
4,057 Views
19 Pages

Adversarial Attack for Deep Steganography Based on Surrogate Training and Knowledge Diffusion

  • Fangjian Tao,
  • Chunjie Cao,
  • Hong Li,
  • Binghui Zou,
  • Longjuan Wang and
  • Jingzhang Sun

29 May 2023

Deep steganography (DS), using neural networks to hide one image in another, has performed well in terms of invisibility, embedding capacity, etc. Current steganalysis methods for DS can only detect or remove secret images hidden in natural images an...

  • Article
  • Open Access
718 Views
19 Pages

10 November 2025

Text data is indispensable for modern machine learning and natural language processing but often contains sensitive information that must be protected before sharing or release. Differential privacy (DP) provides rigorous guarantees for privacy prese...

  • Article
  • Open Access
6 Citations
2,199 Views
14 Pages

Uncovering the Black Box of Coronary Artery Disease Diagnosis: The Significance of Explainability in Predictive Models

  • Agorastos-Dimitrios Samaras,
  • Serafeim Moustakidis,
  • Ioannis D. Apostolopoulos,
  • Elpiniki Papageorgiou and
  • Nikolaos Papandrianos

12 July 2023

In recent times, coronary artery disease (CAD) prediction and diagnosis have been the subject of many Medical decision support systems (MDSS) that make use of machine learning (ML) and deep learning (DL) algorithms. The common ground of most of these...

  • Article
  • Open Access
11 Citations
6,045 Views
14 Pages

Effectively Tackling Reinsurance Problems by Using Evolutionary and Swarm Intelligence Algorithms

  • Sancho Salcedo-Sanz,
  • Leo Carro-Calvo,
  • Mercè Claramunt,
  • Ana Castañer and
  • Maite Mármol

1 April 2014

This paper is focused on solving different hard optimization problems that arise in the field of insurance and, more specifically, in reinsurance problems. In this area, the complexity of the models and assumptions considered in the definition of the...

  • Article
  • Open Access
8 Citations
3,144 Views
26 Pages

How to Open a Black Box Classifier for Tabular Data

  • Bradley Walters,
  • Sandra Ortega-Martorell,
  • Ivan Olier and
  • Paulo J. G. Lisboa

27 March 2023

A lack of transparency in machine learning models can limit their application. We show that analysis of variance (ANOVA) methods extract interpretable predictive models from them. This is possible because ANOVA decompositions represent multivariate f...

  • Feature Paper
  • Article
  • Open Access
3 Citations
2,421 Views
28 Pages

An Integrated Artificial Intelligence Approach for Building Energy Demand Forecasting

  • Andrea Vieri,
  • Agostino Gambarotta,
  • Mirko Morini and
  • Costanza Saletti

1 October 2024

Buildings are complex assets, characterized by environments and uses that change over time, variable occupancies, and long life cycles. They have high operational costs, mostly due to their energy requirements, and account for 30% to 40% of global gr...

  • Article
  • Open Access
5 Citations
2,123 Views
23 Pages

15 April 2024

Mainstream transferable adversarial attacks tend to introduce noticeable artifacts into the generated adversarial examples, which will impair the invisibility of adversarial perturbation and make these attacks less practical in real-world scenarios....

  • Article
  • Open Access
14 Citations
3,677 Views
22 Pages

Hyperparameter optimization is one of the most tedious yet crucial steps in training machine learning models. There are numerous methods for this vital model-building stage, ranging from domain-specific manual tuning guidelines suggested by the oracl...

  • Article
  • Open Access
11 Citations
5,773 Views
18 Pages

Grey-Box Fuzzing Based on Reinforcement Learning for XSS Vulnerabilities

  • Xuyan Song,
  • Ruxian Zhang,
  • Qingqing Dong and
  • Baojiang Cui

15 February 2023

Cross-site scripting (XSS) vulnerabilities are significant threats to web applications. The number of XSS vulnerabilities reported has increased annually for the past three years, posing a considerable challenge to web application maintainers. Black-...

  • Article
  • Open Access
15 Citations
2,873 Views
23 Pages

Boosting Adversarial Transferability with Shallow-Feature Attack on SAR Images

  • Gengyou Lin,
  • Zhisong Pan,
  • Xingyu Zhou,
  • Yexin Duan,
  • Wei Bai,
  • Dazhi Zhan,
  • Leqian Zhu,
  • Gaoqiang Zhao and
  • Tao Li

22 May 2023

Adversarial example generation on Synthetic Aperture Radar (SAR) images is an important research area that could have significant impacts on security and environmental monitoring. However, most current adversarial attack methods on SAR images are des...

  • Article
  • Open Access
4 Citations
3,297 Views
20 Pages

The Limits of SEMA on Distinguishing Similar Activation Functions of Embedded Deep Neural Networks

  • Go Takatoi,
  • Takeshi Sugawara,
  • Kazuo Sakiyama,
  • Yuko Hara-Azumi and
  • Yang Li

20 April 2022

Artificial intelligence (AI) is progressing rapidly, and in this trend, edge AI has been researched intensively. However, much less work has been performed around the security of edge AI. Machine learning models are a mass of intellectual property, a...

  • Article
  • Open Access
4 Citations
4,006 Views
15 Pages

23 January 2019

The “black box” model defines the enhancement, E the polarization modulus, C / C o and the intrinsic enhancement, E o without knowing the transport mechanism in the membrane. This study expresses the a...

  • Article
  • Open Access
2 Citations
2,734 Views
20 Pages

17 October 2024

In recent years, unmanned aerial vehicles (UAVs) vision systems based on deep neural networks (DNNs) have made remarkable advancements, demonstrating impressive performance. However, due to the inherent characteristics of DNNs, these systems have bec...

  • Article
  • Open Access
18 Citations
3,456 Views
20 Pages

18 August 2022

It has been demonstrated that deep neural network (DNN)-based synthetic aperture radar (SAR) automatic target recognition (ATR) techniques are extremely susceptible to adversarial intrusions, that is, malicious SAR images including deliberately gener...

  • Article
  • Open Access
4 Citations
4,242 Views
19 Pages

Measuring Performances of a White-Box Approach in the IoT Context

  • Daniele Giacomo Vittorio Albricci,
  • Michela Ceria,
  • Federico Cioschi,
  • Nicolò Fornari,
  • Arvin Shakiba and
  • Andrea Visconti

3 August 2019

The internet of things (IoT) refers to all the smart objects that are connected to other objects, devices or servers and that are able to collect and share data, in order to “learn” and improve their functionalities. Smart objects suffer...

  • Article
  • Open Access
2,138 Views
20 Pages

22 May 2021

The uncertainty of the engineering system increases with its complexity, therefore, the tolerance to the uncertainty becomes important. Even under large variations of design parameters, the system performance should achieve the design goal in the des...

  • Article
  • Open Access
11 Citations
4,648 Views
19 Pages

An Improved Blind Kriging Surrogate Model for Design Optimization Problems

  • Hau T. Mai,
  • Jaewook Lee,
  • Joowon Kang,
  • H. Nguyen-Xuan and
  • Jaehong Lee

12 August 2022

Surrogate modeling techniques are widely employed in solving constrained expensive black-box optimization problems. Therein, Kriging is among the most popular surrogates in which the trend function is considered as a constant mean. However, it also e...

  • Article
  • Open Access
3 Citations
2,737 Views
22 Pages

21 June 2024

As engineering systems become increasingly complex, performance requirements rise, and tolerance for design parameter variations becomes more crucial due to increased uncertainty. Tolerance to parameter variation can be measured by the volume of the...

  • Article
  • Open Access
18 Citations
3,576 Views
23 Pages

19 August 2021

One of the most common problems in science is to investigate a function describing a system. When the estimate is made based on a classical mathematical model (white-box), the function is obtained throughout solving a differential equation. Alternati...

  • Article
  • Open Access
7 Citations
2,703 Views
19 Pages

Black-Box Modelling and Prediction of Deep-Sea Landing Vehicles Based on Optimised Support Vector Regression

  • Hongming Sun,
  • Wei Guo,
  • Yanjun Lan,
  • Zhenzhuo Wei,
  • Sen Gao,
  • Yu Sun and
  • Yifan Fu

Due to the nonlinearity of the deep-seafloor and complexity of the hydrodynamic force of novel structure platforms, realising an accurate motion mechanism modelling of a deep-sea landing vehicle (DSLV) is difficult. The support vector regression (SVR...

  • Article
  • Open Access
2 Citations
2,853 Views
14 Pages

ICVAE: Interpretable Conditional Variational Autoencoder for De Novo Molecular Design

  • Xiaqiong Fan,
  • Senlin Fang,
  • Zhengyan Li,
  • Hongchao Ji,
  • Minghan Yue,
  • Jiamin Li and
  • Xiaozhen Ren

Recent studies have demonstrated that machine learning-based generative models can create novel molecules with desirable properties. Among them, Conditional Variational Autoencoder (CVAE) is a powerful approach to generate molecules with desired phys...

  • Article
  • Open Access
2 Citations
3,412 Views
22 Pages

Optimisation-Based Feature Selection for Regression Neural Networks Towards Explainability

  • Georgios I. Liapis,
  • Sophia Tsoka and
  • Lazaros G. Papageorgiou

Regression is a fundamental task in machine learning, and neural networks have been successfully employed in many applications to identify underlying regression patterns. However, they are often criticised for their lack of interpretability and commo...

  • Article
  • Open Access
458 Views
17 Pages

17 December 2025

The gearbox is a critical component in modern industrial systems, directly determining the operational reliability of machinery. Therefore, effective fault diagnosis is essential to ensure its proper functioning. Modern diagnostic approaches often em...

  • Article
  • Open Access
19 Citations
5,130 Views
20 Pages

Experiences from City-Scale Simulation of Thermal Grids

  • Johan Simonsson,
  • Khalid Tourkey Atta,
  • Gerald Schweiger and
  • Wolfgang Birk

25 January 2021

Dynamic simulation of district heating and cooling networks has an increased importance in the transition towards renewable energy sources and lower temperature district heating grids, as both temporal and spatial behavior need to be considered. Even...

  • Article
  • Open Access
23 Citations
8,277 Views
30 Pages

17 October 2017

Advanced global optimization algorithms have been continuously introduced and improved to solve various complex design optimization problems for which the objective and constraint functions can only be evaluated through computation intensive numerica...

  • Review
  • Open Access
23 Citations
9,315 Views
19 Pages

Thermodynamic Limits and Optimality of Microbial Growth

  • Nima P. Saadat,
  • Tim Nies,
  • Yvan Rousset and
  • Oliver Ebenhöh

28 February 2020

Understanding microbial growth with the use of mathematical models has a long history that dates back to the pioneering work of Jacques Monod in the 1940s. Monod’s famous growth law expressed microbial growth rate as a simple function of the limiting...

of 6