Results 171 to 180 of about 85,909 (246)

Transform-Dependent Adversarial Attacks

open access: yes
Deep networks are highly vulnerable to adversarial attacks, yet conventional attack methods utilize static adversarial perturbations that induce fixed mispredictions. In this work, we exploit an overlooked property of adversarial perturbations--their dependence on image transforms--and introduce transform-dependent adversarial attacks.
Tan, Yaoteng   +2 more
openaire   +2 more sources

War as a Phenomenon of Inquiry in Management Studies

open access: yesJournal of Management Studies, EarlyView.
Abstract We argue that war as a phenomenon deserves more focused attention in management. First, we highlight why war is an important and relevant area of inquiry for management scholars. We then integrate scattered conversations on war in management studies into a framework structured around three building blocks – (a) the nature of war from an ...
Fabrice Lumineau, Arne Keller
wiley   +1 more source

How Do SMEs Respond to Deglobalization? Insights from Italian SMEs in the Interwar Period (1936–1943)

open access: yesJournal of Management Studies, EarlyView.
Abstract This study investigates how small and medium‐sized enterprises (SMEs) respond to deglobalization and economic nationalism, using historical evidence from fascist Italy, a period of autarky and restricted international trade. While prior research has focused primarily on larger firms, especially multinational enterprises (MNEs), the strategic ...
Valeria Giacomin, Francesco Romagnoli
wiley   +1 more source

Effective faking of verbal deception detection with target‐aligned adversarial attacks

open access: yesLegal and Criminological Psychology, EarlyView.
Abstract Background Deception detection through analysing language is a promising avenue using both human judgements and automated machine learning judgements. For both forms of credibility assessment, automated adversarial attacks that rewrite deceptive statements to appear truthful pose a serious threat.
Bennett Kleinberg   +2 more
wiley   +1 more source

James Lyman Merrick's Aborted “Mission to the Mohammedans of Persia”

open access: yesThe Muslim World, EarlyView.
Abstract James Lyman Merrick (1803‐1866) served as a missionary of the American Board of Commissioners for Foreign Missions (ABCFM) in Persia between 1835 and 1845. He was America's first missionary to the Muslim world. Based on his field research on the Persians’ religious beliefs, he correctly predicted that the conversion of Persia's Muslims into ...
Hooman Estelami
wiley   +1 more source

Words After the Storm: Elite Rhetoric and the Limits of De‐Escalation in Postreferendum Catalonia

open access: yesNations and Nationalism, EarlyView.
ABSTRACT When does a secessionist crisis end? What drives political elites to shift from hostility to moderation? This article examines the prospects of rhetorical de‐escalation in the aftermath of a secessionist dispute through the paradigmatic case of Catalonia.
Daniel Cetrà   +3 more
wiley   +1 more source

Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail

open access: yesPublic Administration, EarlyView.
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley   +1 more source

AI in Public Decision‐Making: A Philosophical and Practical Framework for Assessing and Weighing Harm and Benefit

open access: yesPublic Administration, EarlyView.
ABSTRACT Artificial intelligence (AI) is increasingly used in public decision‐making; yet existing governance tools often lack clear definitions of harm and benefit, practical methods for weighing competing values, and guidance for resolving value conflicts.
Karl de Fine Licht, Anna Folland
wiley   +1 more source

Home - About - Disclaimer - Privacy