Results 81 to 90 of about 94,262 (290)
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas +4 more
wiley +1 more source
Benign-salient Region Based End-to-End Adversarial Malware Generation Method [PDF]
Malware detection methods combining visualization techniques and deep learning have gained widespread attention due to their high accuracy and low cost.However,deep learning models are vulnerable to adversarial attacks,where intentional small-scale ...
YUAN Mengjiao, LU Tianliang, HUANG Wanxin, HE Houhan
doaj +1 more source
Study of Pre-processing Defenses against Adversarial Attacks on\n State-of-the-art Speaker Recognition Systems [PDF]
Sonal Joshi +4 more
openalex +1 more source
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
Advancing design strategies in smart stimulus‐responsive liposomes for drug release and nanomedicine
Schematic illustration of stimulus‐responsive liposomes designed for controlled drug release and nanomedicine. The innermost circle represents different liposomal structures, including unilamellar, multilamellar, and multivesicular liposomes. The middle layer illustrates the responsive phospholipid components.
Yuchen Guo +9 more
wiley +1 more source
Causality adversarial attack generation algorithm for intelligent unmanned communication system
A causality adversarial attack generation algorithm was proposed in response to the causality issue of gradient-based adversarial attack generation algorithms in practical communication system.The sequential input-output features and temporal memory ...
Shuwen YU, Wei XU, Jiacheng YAO
doaj +2 more sources
AI‐based localization of the epileptogenic zone using intracranial EEG
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida +5 more
wiley +1 more source
Attention, Please! Adversarial Defense via Attention Rectification and Preservation
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping +6 more
core
Overview of the proposed work. ABSTRACT Identifying cyber threats maintains the security and operational stability of smart grid systems because they experience escalating attacks that endanger both operating data reliability and system stability and electricity grid performance.
Priya R. Karpaga +3 more
wiley +1 more source

