Results 131 to 140 of about 16,308 (300)

Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain

open access: yesIEEE Access
In recent years, CNN-based object detectors have been widely adopted in autonomous systems. Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks.
Phornphawit Manasut   +5 more
doaj   +1 more source

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Adversarial Attacks on Medical Image Classification. [PDF]

open access: yesCancers (Basel), 2023
Tsai MJ, Lin PY, Lee ME.
europepmc   +1 more source

South Africa: The Ambiguities of a Middle Power

open access: yesGlobal Policy, EarlyView.
ABSTRACT South Africa represents an interesting species of a middle power. This derives from its inherited economic muscle as Africa's powerhouse and the liberation struggle against apartheid, both of which have shaped its democratic transition. The traditions of liberation and democracy, in turn, have profoundly influenced how South Africa has ...
Garth L. le Pere
wiley   +1 more source

Structack: Structure-based Adversarial Attacks on Graph Neural Networks [PDF]

open access: gold, 2021
Hussain Hussain   +5 more
openalex   +1 more source

Boosting Adversarial Transferability Through Adversarial Attack Enhancer

open access: yesApplied Sciences
Adversarial attacks against deep learning models achieve high performance in white-box settings but often exhibit low transferability in black-box scenarios, especially against defended models. In this work, we propose Multi-Path Random Restart (MPRR), which initializes multiple restart points with random noise to optimize gradient updates and improve ...
Wenli Zeng, Hong Huang, Jixin Chen
openaire   +1 more source

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Local imperceptible adversarial attacks against human pose estimation networks. [PDF]

open access: yesVis Comput Ind Biomed Art, 2023
Liu F, Zhang S, Wang H, Yan C, Miao Y.
europepmc   +1 more source

Semantic Adversarial Attacks: Parametric Transformations That Fool Deep\n Classifiers [PDF]

open access: green, 2019
Ameya Joshi   +3 more
openalex   +1 more source

Home - About - Disclaimer - Privacy