Results 131 to 140 of about 16,308 (300)
Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain
In recent years, CNN-based object detectors have been widely adopted in autonomous systems. Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks.
Phornphawit Manasut +5 more
doaj +1 more source
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Adversarial Attacks on Medical Image Classification. [PDF]
Tsai MJ, Lin PY, Lee ME.
europepmc +1 more source
Defending Against Adversarial Attacks by Leveraging an Entire GAN [PDF]
Gokula Krishnan Santhanam +1 more
openalex +1 more source
South Africa: The Ambiguities of a Middle Power
ABSTRACT South Africa represents an interesting species of a middle power. This derives from its inherited economic muscle as Africa's powerhouse and the liberation struggle against apartheid, both of which have shaped its democratic transition. The traditions of liberation and democracy, in turn, have profoundly influenced how South Africa has ...
Garth L. le Pere
wiley +1 more source
Structack: Structure-based Adversarial Attacks on Graph Neural Networks [PDF]
Hussain Hussain +5 more
openalex +1 more source
Boosting Adversarial Transferability Through Adversarial Attack Enhancer
Adversarial attacks against deep learning models achieve high performance in white-box settings but often exhibit low transferability in black-box scenarios, especially against defended models. In this work, we propose Multi-Path Random Restart (MPRR), which initializes multiple restart points with random noise to optimize gradient updates and improve ...
Wenli Zeng, Hong Huang, Jixin Chen
openaire +1 more source
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Local imperceptible adversarial attacks against human pose estimation networks. [PDF]
Liu F, Zhang S, Wang H, Yan C, Miao Y.
europepmc +1 more source
Semantic Adversarial Attacks: Parametric Transformations That Fool Deep\n Classifiers [PDF]
Ameya Joshi +3 more
openalex +1 more source

