Results 111 to 120 of about 96,849 (322)
SURVEY OF ADVERSARIAL ATTACKS AND DEFENSE AGAINST ADVERSARIAL ATTACKS
In recent years, the fields of Artificial Intelligence (AI) and Deep learning (DL) techniques along with Neural Networks (NNs) have shown great progress and scope for future research. Along with all the developments comes the threats and security vulnerabilities to Neural Networks and AI models. A few fabricated inputs/samples can lead to deviations in
Akshat Jain +3 more
openaire +1 more source
ABSTRACT Background Magnetic Resonance Fingerprinting (MRF) enables rapid quantitative parameter mapping from which synthetic clinical contrast images can be derived using deep learning (DL). Purpose This study evaluates the reliability and interchangeability of MRF‐derived synthetic knee MRI relative to conventional MRI in patients with osteoarthritis.
Mika T. Nevalainen +9 more
wiley +1 more source
Llm-ga: A gradient-based multi-label adversarial attack by large language models
Deep neural networks (DNNs) are highly sensitive to small, meticulously crafted perturbations, which have been utilized in adversarial attacks, threatening the reliability of DNNs in practical applications. Current adversarial attack methods rely heavily
Yujiang Liu +4 more
doaj +1 more source
DIPA: Adversarial Attack on DNNs by Dropping Information and Pixel-Level Attack on Attention
Deep neural networks (DNNs) have shown remarkable performance across a wide range of fields, including image recognition, natural language processing, and speech processing. However, recent studies indicate that DNNs are highly vulnerable to well-crafted
Jing Liu +4 more
doaj +1 more source
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster +5 more
wiley +1 more source
Researching infrared adversarial attacks is crucial for ensuring the safe deployment of security-sensitive systems reliant on infrared object detectors.
Zhiyang Hu +6 more
doaj +1 more source
Comparison and Evaluation of the attacks and defenses against Adversarial attacks
Aleksandar Janković
openalex +1 more source
Interdiction Models and Heuristics for Graph Propagation
ABSTRACT Given a graph G=(V,E)$$ G=\left(V,E\right) $$ and a set S⊂V$$ S\subset V $$ of activated/infected nodes, we consider the problem of determining the set of c$$ c $$ nodes that minimizes the network propagation on the subgraph that results from the removal of those c$$ c $$ nodes. To measure network propagation, we assume that a node i$$ i $$ is
Agostinho Agra, José Maria Samuco
wiley +1 more source
Black-Box Universal Adversarial Attack for DNN-Based Models of SAR Automatic Target Recognition
Synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep neural networks (DNNs) are vulnerable to attacks of adversarial examples. Universal adversarial attack algorithms can help evaluate and improve the robustness of the SAR-
Xuanshen Wan +5 more
doaj +1 more source
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien +2 more
wiley +1 more source

