Results 131 to 140 of about 85,609 (269)

Western Balkans as the Frontline of Russian Hybrid Warfare

open access: yesGlobal Policy, EarlyView.
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley   +1 more source

Countering FIMI by Digital Authoritarianisms: Audience Architecture and Reverse Language Engineering

open access: yesGlobal Policy, EarlyView.
ABSTRACT Foreign information manipulation and interference (FIMI) campaigns on social media are currently both more accessible and more impactful than the North Atlantic Treaty Organization's (NATO) or European Union's (EU), offering their opponents superiority and efficiency on those platforms.
Michelangelo Conoscenti
wiley   +1 more source

Adversarial Attacks on Medical Image Classification. [PDF]

open access: yesCancers (Basel), 2023
Tsai MJ, Lin PY, Lee ME.
europepmc   +1 more source

When Is an Audit “Good Enough”? Professional Ambiguity and Strategic Sensemaking During an Audit Oversight Inspection Quand un audit est‐il « assez réussi » ? Ambiguïté professionnelle et construction stratégique de sens lors d'une surveillance des audits

open access: yesContemporary Accounting Research, EarlyView.
ABSTRACT This paper draws on the social control and sensemaking literatures to study how a Big 4 audit firm in the Netherlands sought to contest the national oversight body's inspection findings on one of its audit engagements. Our case study leads us to develop the concept of professional ambiguity to capture the multiple, coexisting meanings and ...
Wendy Groot, Dominic Detzen, Anna Gold
wiley   +1 more source

URAdv: A Novel Framework for Generating Ultra-Robust Adversarial Patches Against UAV Object Detection

open access: yesMathematics
In recent years, deep learning has been extensively deployed on unmanned aerial vehicles (UAVs), particularly for object detection. As the cornerstone of UAV-based object detection, deep neural networks are susceptible to adversarial attacks, with ...
Hailong Xi   +6 more
doaj   +1 more source

The Hollowing Out of News: The Implications of the Erosion of Public Interest Journalism

open access: yesAccounting &Finance, EarlyView.
ABSTRACT This essay examines the structural erosion of public interest journalism and its implications for public accountability, institutional trust and research. Focusing on Australia, with Anglo‐American comparisons, it shows how economic, technological and regulatory disruptions have undermined investigative journalism, thereby weakening scrutiny ...
Clinton Free
wiley   +1 more source

Local imperceptible adversarial attacks against human pose estimation networks. [PDF]

open access: yesVis Comput Ind Biomed Art, 2023
Liu F, Zhang S, Wang H, Yan C, Miao Y.
europepmc   +1 more source

Strategic litigation as a challenge for deliberative democracy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Strategic litigation is a growing public concern, but remains understudied in democratic theory. In strategic litigation, collectives go to court with a political agenda that goes beyond their specific case. How should we assess the legitimacy of strategic litigation? Building on Lafont's model of deliberative democracy and Klein's distinction
Svenja Ahlhaus
wiley   +1 more source

FAMF: Robust Feature-Level Adversarial Attack on Metric-Based Few-Shot Learning Models

open access: yesIEEE Access
Few-shot learning has emerged as the primary approach for tasks with extremely limited training data. In particular, metric-based few-shot learning has been highlighted for enabling effective generalization to new tasks by comparing feature similarity ...
Gwang-Nam Kim   +4 more
doaj   +1 more source

Adversarial detection based on feature invariant in license plate recognition systems

open access: yes网络与信息安全学报
Deep neural networks have become an integral part of people's daily lives. However, researchers observed that these networks were susceptible to threats from adversarial samples, leading to abnormal behaviors such as misclassification by the network ...
ZHU Xiaoyu   +4 more
doaj  

Home - About - Disclaimer - Privacy