Results 141 to 150 of about 94,262 (290)

Adversarial Regression for Detecting Attacks in Cyber-Physical Systems [PDF]

open access: gold, 2018
Amin Ghafouri   +2 more
openalex   +1 more source

Defeating Adversarial Attacks Againt Adversarial attacks in Network Security

open access: green, 2022
Ehsan Nowroozi   +5 more
openalex   +1 more source

Towards Interpretable Adversarial Examples via Sparse Adversarial Attack

open access: yes
Sparse attacks are to optimize the magnitude of adversarial perturbations for fooling deep neural networks (DNNs) involving only a few perturbed pixels (i.e., under the l0 constraint), suitable for interpreting the vulnerability of DNNs. However, existing solutions fail to yield interpretable adversarial examples due to their poor sparsity. Worse still,
Lin, Fudong   +4 more
openaire   +2 more sources

South Africa: The Ambiguities of a Middle Power

open access: yesGlobal Policy, EarlyView.
ABSTRACT South Africa represents an interesting species of a middle power. This derives from its inherited economic muscle as Africa's powerhouse and the liberation struggle against apartheid, both of which have shaped its democratic transition. The traditions of liberation and democracy, in turn, have profoundly influenced how South Africa has ...
Garth L. le Pere
wiley   +1 more source

Robustness Against Adversarial Attacks Via Learning Confined Adversarial Polytopes

open access: yesICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Comment: The paper has been accepted in ICASSP ...
Hamidi, Shayan Mohajer, Ye, Linfeng
openaire   +2 more sources

Rethinking the contract‐failure theory

open access: yesAmerican Business Law Journal, EarlyView.
Abstract The contract‐failure theory posits that the nonprofit form can be an indicator of high product quality because the nondistribution constraint reduces the nonprofit manager's financial benefits from cheating. This would give nonprofits an advantage over for‐profit firms when consumers cannot determine product quality and thus explains ...
Yumiao Wang
wiley   +1 more source

Strategic litigation as a challenge for deliberative democracy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Strategic litigation is a growing public concern, but remains understudied in democratic theory. In strategic litigation, collectives go to court with a political agenda that goes beyond their specific case. How should we assess the legitimacy of strategic litigation? Building on Lafont's model of deliberative democracy and Klein's distinction
Svenja Ahlhaus
wiley   +1 more source

Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition. [PDF]

open access: yesSensors (Basel), 2021
Lal S   +7 more
europepmc   +1 more source

Feelings Without Emotion: Rethinking Male Friendship and the Value of Personal Reticence

open access: yesAmerican Anthropologist, EarlyView.
ABSTRACT In various Euro‐American contexts, commentators have highlighted how emotional reticence inhibits men's ability to understand themselves and connect with others. More generally, public discourses of affective expressivity often present curtailed emotion as a form of “repression.” Through an ethnographic account of male railway enthusiasts ...
Thomas Yarrow
wiley   +1 more source

Home - About - Disclaimer - Privacy