Results 151 to 160 of about 353,439 (278)
Towards Interpretable Adversarial Examples via Sparse Adversarial Attack
Sparse attacks are to optimize the magnitude of adversarial perturbations for fooling deep neural networks (DNNs) involving only a few perturbed pixels (i.e., under the l0 constraint), suitable for interpreting the vulnerability of DNNs. However, existing solutions fail to yield interpretable adversarial examples due to their poor sparsity. Worse still,
Lin, Fudong +4 more
openaire +2 more sources
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas +4 more
wiley +1 more source
ABSTRACT For adults with intellectual disability and their families, future planning and moving out of the family home in Australia will increasingly occur within the context of the National Disability Insurance Scheme (NDIS). As a market‐based, individualised funding system its impact on this transition remains largely unknown. This paper reports on a
I. Belperio +5 more
wiley +1 more source
Threats and vulnerabilities in artificial intelligence and agentic AI models. [PDF]
Radanliev P, Santos O, Maple C.
europepmc +1 more source
A Spatially Distributed Perturbation Strategy with Smoothed Gradient Sign Method for Adversarial Analysis of Image Classification Systems. [PDF]
Xu Y, Li J, Chang D, Dong Y.
europepmc +1 more source
Abstract The emergence of generative artificial intelligence (GenAI) is reshaping the research landscape and carries significant implications for Digital Humanities (DH), a field long intertwined with computational methods and technologies. This study examines how DH scholars are adopting and critically evaluating GenAI in their research. Drawing on an
Rongqian Ma, Meredith Dedema, Andrew Cox
wiley +1 more source
Adversarial robust EEG-based brain-computer interfaces using a hierarchical convolutional neural network. [PDF]
Samuel J +5 more
europepmc +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Evaluating gait system vulnerabilities through PPO and GAN-generated adversarial attacks. [PDF]
Saoudi EM, Jaafari J, Jai Andaloussi S.
europepmc +1 more source
Cutting edge strategies for diabetic wound care: Nanotechnology, bioengineering, and beyond
Graphical abstract illustrates the challenges in diabetic wound healing, covering pathophysiology, formulation hurdles, and emerging therapeutic strategies. It highlights the role of hyperglycemia, formulation complexities, and advanced technologies like bioprinting and AI in improving diabetic wound management. Abstract Diabetic wounds affect millions
Usama Ahmad +8 more
wiley +1 more source

