Results 81 to 90 of about 85,688 (262)
Abstract If sexual assault survivors report the assault to the criminal legal system, they often need informal support from family and friends throughout the long and frequently retraumatizing process of investigation and prosecution. This study is part of a long‐term community‐based participatory action research project in a predominately Black ...
Rebecca Campbell +4 more
wiley +1 more source
ABSTRACT This study explores youth violence towards police officers in Australia through the Power Threat Meaning Framework (PTMF) to better understand the underlying factors contributing to such violence; focusing on power dynamics, childhood adversity, and trauma.
Dimitra Lattas +4 more
wiley +1 more source
Causality adversarial attack generation algorithm for intelligent unmanned communication system
A causality adversarial attack generation algorithm was proposed in response to the causality issue of gradient-based adversarial attack generation algorithms in practical communication system.The sequential input-output features and temporal memory ...
Shuwen YU, Wei XU, Jiacheng YAO
doaj +2 more sources
An adversarial attack method based on pixel location characteristics
Deep learning techniques have been widely used in various fields. However, they face significant security challenges due to the existence of adversarial examples.
Zhao Qin +4 more
doaj +1 more source
Attention, Please! Adversarial Defense via Attention Rectification and Preservation
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping +6 more
core
Prioritizing Feasible and Impactful Actions to Enable Secure AI Development and Use in Biology
ABSTRACT As artificial intelligence continues to enhance biological innovation, the potential for misuse must be addressed to fully unlock the potential societal benefits. While significant work has been done to evaluate general‐purpose AI and specialized biological design tools (BDTs) for biothreat creation risks, actionable steps to mitigate the risk
Josh Dettman +4 more
wiley +1 more source
With the development of artificial intelligence, machine learning algorithms and deep learning algorithms are widely applied to attack detection models. Adversarial attacks against artificial intelligence models become inevitable problems when there is a
Yong Fang +3 more
doaj +1 more source
Advancing design strategies in smart stimulus‐responsive liposomes for drug release and nanomedicine
Schematic illustration of stimulus‐responsive liposomes designed for controlled drug release and nanomedicine. The innermost circle represents different liposomal structures, including unilamellar, multilamellar, and multivesicular liposomes. The middle layer illustrates the responsive phospholipid components.
Yuchen Guo +9 more
wiley +1 more source
Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks
Machine learning systems based on deep neural networks, being able to produce state-of-the-art results on various perception tasks, have gained mainstream adoption in many applications.
Liu, Yannan +3 more
core +1 more source
AI‐based localization of the epileptogenic zone using intracranial EEG
Abstract Artificial intelligence (AI) is rapidly transforming our lives. Machine learning (ML) enables computers to learn from data and make decisions without explicit instructions. Deep learning (DL), a subset of ML, uses multiple layers of neural networks to recognize complex patterns in large datasets through end‐to‐end learning.
Atsuro Daida +5 more
wiley +1 more source

