Results 101 to 110 of about 85,688 (262)

Transferable Adversarial Attacks Against ASR

open access: yesIEEE Signal Processing Letters
Given the extensive research and real-world applications of automatic speech recognition (ASR), ensuring the robustness of ASR models against minor input perturbations becomes a crucial consideration for maintaining their effectiveness in real-time scenarios.
Xiaoxue Gao   +4 more
openaire   +2 more sources

Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions

open access: yes, 2020
Despite the remarkable performance and generalization levels of deep learning models in a wide range of artificial intelligence tasks, it has been demonstrated that these models can be easily fooled by the addition of imperceptible yet malicious perturbations to natural inputs.
Vadillo, Jon   +2 more
openaire   +3 more sources

Organoids and organ‐on‐a‐chip models for investigating the pathophysiology of the human reproductive system

open access: yesInterdisciplinary Medicine, EarlyView.
Organoids and organ‐on‐a‐chips are advancing reproductive system research. In the female reproductive system, applications include cancer organoid models, placental chips, and hormone simulation models. For the male reproductive system, research focuses on drug resistance mechanisms, co‐culture platforms, and infertility studies. These refined in vitro
Hongqi Zhang   +6 more
wiley   +1 more source

Physically structured adversarial patch inspired by natural leaves multiply angles deceives infrared detectors

open access: yesJournal of King Saud University: Computer and Information Sciences
Researching infrared adversarial attacks is crucial for ensuring the safe deployment of security-sensitive systems reliant on infrared object detectors.
Zhiyang Hu   +6 more
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Preparing for Tomorrow's Teamwork: Insights From eSports on How Human Expertise Shapes Training Needs for AI‐Integrated Work

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster   +5 more
wiley   +1 more source

DLSF:A Textual Adversarial Attack Method Based on Dual-level Semantic Filtering [PDF]

open access: yesJisuanji kexue
In the field of commercial applications,deep learning-based text models play a crucial role but are also susceptible to adversarial samples,such as the incorporation of confusing vocabulary into reviews leading to erroneous model responses.A strong ...
XIONG Xi, DING Guangzheng, WANG Juan, ZHANG Shuai
doaj   +1 more source

Navigating the Rapids: How Non‐Governmental Organization Managers Develop Strategic Adaptation to Repressive Political Environments

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien   +2 more
wiley   +1 more source

Why do we burn? Examining arguments underpinning the use of prescribed burning to manage wildfire risk

open access: yesPeople and Nature, EarlyView.
Abstract Managing wildfire risk requires consideration of complex and uncertain scientific evidence as well as trade‐offs between different values and goals. Conflicting perspectives on what values and goals are most important, what ought to be done and what trade‐offs are acceptable complicate those decisions.
Pele J. Cannon, Sarah Clement
wiley   +1 more source

Home - About - Disclaimer - Privacy