Results 111 to 120 of about 96,849 (322)

SURVEY OF ADVERSARIAL ATTACKS AND DEFENSE AGAINST ADVERSARIAL ATTACKS

open access: yesDarpan International Research Analysis
In recent years, the fields of Artificial Intelligence (AI) and Deep learning (DL) techniques along with Neural Networks (NNs) have shown great progress and scope for future research. Along with all the developments comes the threats and security vulnerabilities to Neural Networks and AI models. A few fabricated inputs/samples can lead to deviations in
Akshat Jain   +3 more
openaire   +1 more source

Clinical Feasibility of Deep Learning Contrast Synthesis From MR Fingerprinting in Knee Osteoarthritis

open access: yesJournal of Magnetic Resonance Imaging, EarlyView.
ABSTRACT Background Magnetic Resonance Fingerprinting (MRF) enables rapid quantitative parameter mapping from which synthetic clinical contrast images can be derived using deep learning (DL). Purpose This study evaluates the reliability and interchangeability of MRF‐derived synthetic knee MRI relative to conventional MRI in patients with osteoarthritis.
Mika T. Nevalainen   +9 more
wiley   +1 more source

Llm-ga: A gradient-based multi-label adversarial attack by large language models

open access: yesComplex & Intelligent Systems
Deep neural networks (DNNs) are highly sensitive to small, meticulously crafted perturbations, which have been utilized in adversarial attacks, threatening the reliability of DNNs in practical applications. Current adversarial attack methods rely heavily
Yujiang Liu   +4 more
doaj   +1 more source

DIPA: Adversarial Attack on DNNs by Dropping Information and Pixel-Level Attack on Attention

open access: yesInformation
Deep neural networks (DNNs) have shown remarkable performance across a wide range of fields, including image recognition, natural language processing, and speech processing. However, recent studies indicate that DNNs are highly vulnerable to well-crafted
Jing Liu   +4 more
doaj   +1 more source

Preparing for Tomorrow's Teamwork: Insights From eSports on How Human Expertise Shapes Training Needs for AI‐Integrated Work

open access: yesJournal of Organizational Behavior, EarlyView.
ABSTRACT As organizations increasingly adopt human‐AI teams (HATs), understanding how to enhance team performance is paramount. A crucially underexplored area for supporting HATs is training, particularly helping human teammates to work with these inorganic counterparts.
Caitlin M. Lancaster   +5 more
wiley   +1 more source

Physically structured adversarial patch inspired by natural leaves multiply angles deceives infrared detectors

open access: yesJournal of King Saud University: Computer and Information Sciences
Researching infrared adversarial attacks is crucial for ensuring the safe deployment of security-sensitive systems reliant on infrared object detectors.
Zhiyang Hu   +6 more
doaj   +1 more source

Interdiction Models and Heuristics for Graph Propagation

open access: yesNetworks, EarlyView.
ABSTRACT Given a graph G=(V,E)$$ G=\left(V,E\right) $$ and a set S⊂V$$ S\subset V $$ of activated/infected nodes, we consider the problem of determining the set of c$$ c $$ nodes that minimizes the network propagation on the subgraph that results from the removal of those c$$ c $$ nodes. To measure network propagation, we assume that a node i$$ i $$ is
Agostinho Agra, José Maria Samuco
wiley   +1 more source

Black-Box Universal Adversarial Attack for DNN-Based Models of SAR Automatic Target Recognition

open access: yesIEEE Journal of Selected Topics in Applied Earth Observations and Remote Sensing
Synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep neural networks (DNNs) are vulnerable to attacks of adversarial examples. Universal adversarial attack algorithms can help evaluate and improve the robustness of the SAR-
Xuanshen Wan   +5 more
doaj   +1 more source

Navigating the Rapids: How Non‐Governmental Organization Managers Develop Strategic Adaptation to Repressive Political Environments

open access: yesPublic Administration and Development, EarlyView.
ABSTRACT This article explores the management adaptation strategies non‐governmental organizations (NGOs) managers employ in order to operate in repressive political environments. It answers the question: how do NGO managers initiate, manage and sustain internal change when the political/regulatory environment changes?
Charles Kaye‐Essien   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy