Page
%P
![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A hybrid style transfer with whale optimization algorithm model for textual adversarial attack
Deep learning has been widely used in various research fields. However, researchers have discovered that deep learning models are vulnerable to adversarial attacks. Existing word-level attacks can be seen as a...
-
Article
Ligand exchange during cytochrome c folding
Submillisecond folding of cytochrome c reveals that a nascent phase appears within the mixing dead time of 100 μs, followed by a ligand exchange reaction during which His 26/33, water and Met 80 are inter-exchang...