Results 81 to 90 of about 85,688 (262)

“Will you be there for me?” Social support from family and friends during cold case sexual assault prosecutions

open access: yesAmerican Journal of Community Psychology, EarlyView.
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell   +4 more
wiley   +1 more source

Understanding Youth Assaults of Police Officers in Australia: A Power Threat Meaning Framework Analysis

open access: yesAustralian Journal of Social Issues, EarlyView.
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas   +4 more
wiley   +1 more source

Causality adversarial attack generation algorithm for intelligent unmanned communication system

open access: yesTongxin xuebao
A causality adversarial attack generation algorithm was proposed in response to the causality issue of gradient-based adversarial attack generation algorithms in practical communication system.The sequential input-output features and temporal memory ...
Shuwen YU, Wei XU, Jiacheng YAO
doaj   +2 more sources

An adversarial attack method based on pixel location characteristics

open access: yesJournal of Intelligent Systems
Deep learning techniques have been widely used in various fields. However, they face significant security challenges due to the existence of adversarial examples.
Zhao Qin   +4 more
doaj   +1 more source

Attention, Please! Adversarial Defense via Attention Rectification and Preservation

open access: yes, 2019
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping   +6 more
core  

Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology

open access: yesBiotechnology and Bioengineering, EarlyView.
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman   +4 more
wiley   +1 more source

RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

open access: yesFuture Internet, 2019
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang   +3 more
doaj   +1 more source

Advancing design strategies in smart stimulus‐responsive liposomes for drug release and nanomedicine

open access: yesBMEMat, EarlyView.
Schematic illustration of stimulus‐responsive liposomes designed for controlled drug release and nanomedicine. The innermost circle represents different liposomal structures, including unilamellar, multilamellar, and multivesicular liposomes. The middle layer illustrates the responsive phospholipid components.
Yuchen Guo   +9 more
wiley   +1 more source

Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

open access: yes, 2018
Machine learning systems based on deep neural networks, being able to produce state-of-the-art results on various perception tasks, have gained mainstream adoption in many applications.
Liu, Yannan   +3 more
core   +1 more source

AI‐based localization of the epileptogenic zone using intracranial EEG

open access: yesEpilepsia Open, EarlyView.
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy