Results 121 to 130 of about 85,609 (269)
Recent studies have shown that machine-learning models are vulnerable to adversarial attacks. Adversarial attacks are deliberate attempts to modify the input data of a machine learning model in a way that causes it to produce incorrect predictions.
Palakorn Kamnounsing +3 more
doaj +1 more source
Rigid Body Adversarial Attacks
Due to their performance and simplicity, rigid body simulators are often used in applications where the objects of interest can considered very stiff. However, no material has infinite stiffness, which means there are potentially cases where the non-zero compliance of the seemingly rigid object can cause a significant difference between its ...
Aravind Ramakrishnan +2 more
openaire +2 more sources
AT‐AER: Adversarial Training With Adaptive Example Reuse
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu +5 more
wiley +1 more source
From Ambiguous Queries to Verifiable Insights: A Task‐Driven Framework for LLM‐Powered SOC Analysis⋆
ABSTRACT Security operations centre (SOC) analysts must investigate alerts, correlate threat intelligence and interpret heterogeneous telemetry under tight timing constraints. Although large language models (LLMs) offer strong understanding capabilities, directly applying them to SOC environments remains challenging due to semantic ambiguity in analyst
Huan Zhang +5 more
wiley +1 more source
Certified Accuracy and Robustness: How different architectures stand up to adversarial attacks
Adversarial attacks are a concern for image classification using neural networks. Numerous methods have been created to minimize the effects of attacks, where the best defense against such attacks is through adversarial training, which has proven to be ...
Azryl Elmy Sarih +2 more
doaj +1 more source
Adaptive Perturbation for Adversarial Attack
In recent years, the security of deep learning models achieves more and more attentions with the rapid development of neural networks, which are vulnerable to adversarial examples. Almost all existing gradient-based attack methods use the sign function in the generation to meet the requirement of perturbation budget on $L_\infty$ norm. However, we find
Zheng Yuan 0005 +4 more
openaire +3 more sources
Neural Network Repair With Shapley‐Guided Search
ABSTRACT The deployment of deep neural networks (DNNs) in safety‐critical domains is critically hampered by their vulnerability to defects, which can arise from malicious attacks or low‐quality data. Therefore, precisely locating the network components responsible for these defects, and subsequently repairing them without compromising overall model ...
Xiaofu Du +4 more
wiley +1 more source
‘Pro‐Germans in the Pulpits’: The Queensland Presbyterian Church and the Great War
During World War I, Protestant churches in Australia, on the whole, enthusiastically supported the war effort. The Queensland Presbyterian Church was a significant exception. This study analyses discord and tensions among its clergymen about what constituted an appropriate response to the war.
Mark Cryle
wiley +1 more source
Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain
In recent years, CNN-based object detectors have been widely adopted in autonomous systems. Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks.
Phornphawit Manasut +5 more
doaj +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source

