Results 151 to 160 of about 85,909 (246)
ABSTRACT Smart energy management systems (EMS) are entering a phase of rapid transformation. Artificial intelligence (AI)—including machine learning (ML), deep learning (DL), and reinforcement learning (RL)—has become the computational backbone for real‐time forecasting, scheduling, and control of renewable‐rich power systems.
Sihai An +5 more
wiley +1 more source
Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition. [PDF]
Lal S +7 more
europepmc +1 more source
While death remains a popular topic for anthropology, relatively few ethnographic accounts consider the modern bureaucratic processes accompanying it. One such process is public health autopsy, which scholars have largely taken for granted. Existing analysis has regarded it as a form of ‘cultural brokering’ and autopsy reluctance in communities is seen,
David M.R. Orr
wiley +1 more source
Rigid Body Adversarial Attacks
Due to their performance and simplicity, rigid body simulators are often used in applications where the objects of interest can considered very stiff. However, no material has infinite stiffness, which means there are potentially cases where the non-zero compliance of the seemingly rigid object can cause a significant difference between its ...
Ramakrishnan, Aravind +2 more
openaire +2 more sources
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu +5 more
doaj +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
IG-Based Method for Voiceprint Universal Adversarial Perturbation Generation
In this paper, we propose an Iterative Greedy-Universal Adversarial Perturbations (IGUAP) approach based on an iterative greedy algorithm to create universal adversarial perturbations for acoustic prints.
Meng Bi, Xianyun Yu, Zhida Jin, Jian Xu
doaj +1 more source
Countering FIMI by Digital Authoritarianisms: Audience Architecture and Reverse Language Engineering
ABSTRACT Foreign information manipulation and interference (FIMI) campaigns on social media are currently both more accessible and more impactful than the North Atlantic Treaty Organization's (NATO) or European Union's (EU), offering their opponents superiority and efficiency on those platforms.
Michelangelo Conoscenti
wiley +1 more source
ABSTRACT This paper draws on the social control and sensemaking literatures to study how a Big 4 audit firm in the Netherlands sought to contest the national oversight body's inspection findings on one of its audit engagements. Our case study leads us to develop the concept of professional ambiguity to capture the multiple, coexisting meanings and ...
Wendy Groot, Dominic Detzen, Anna Gold
wiley +1 more source

