Results 151 to 160 of about 16,308 (300)
Abstract This paper offers a psychoanalytic critique of the affirmation model in gender identity care, drawing on clinical experience from the Tavistock Gender Identity Development Service (GIDS). It argues that institutional and therapeutic responses to gender distress in young people are increasingly shaped by pressures to affirm rather than to ...
Marcus Evans
wiley +1 more source
Adversarial detection based on feature invariant in license plate recognition systems
Deep neural networks have become an integral part of people's daily lives. However, researchers observed that these networks were susceptible to threats from adversarial samples, leading to abnormal behaviors such as misclassification by the network ...
ZHU Xiaoyu +4 more
doaj
Robustness of Sparsely Distributed Representations to Adversarial Attacks in Deep Neural Networks. [PDF]
Sardar N, Khan S, Hintze A, Mehra P.
europepmc +1 more source
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT. [PDF]
Li S, Wang J, Wang Y, Zhou G, Zhao Y.
europepmc +1 more source
Textile and colour defect detection using deep learning methods
Abstract Recent advances in deep learning (DL) have significantly enhanced the detection of textile and colour defects. This review focuses specifically on the application of DL‐based methods for defect detection in textile and coloration processes, with an emphasis on object detection and related computer vision (CV) tasks.
Hao Cui +2 more
wiley +1 more source
Attack and Reset for Unlearning: Exploiting Adversarial Noise toward Machine Unlearning through Parameter Re-initialization [PDF]
Yoonhwa Jung +3 more
openalex +1 more source
Evaluating Retinal Disease Diagnosis with an Interpretable Lightweight CNN Model Resistant to Adversarial Attacks. [PDF]
Bhandari M, Shahi TB, Neupane A.
europepmc +1 more source
In this commentary on ‘Annual Research Review: Early conduct problems – precursors, outcomes, and etiology’ by Hyde and colleagues, I discuss the strengths of that review and its heuristic value in inspiring future research directions. The review is an impressive, comprehensive, scholarly, and up‐to‐date broad summary of the current state of ...
Grazyna Kochanska
wiley +1 more source
A Lightweight Method for Defense Graph Neural Networks Adversarial Attacks. [PDF]
Qiao Z, Wu Z, Chen J, Ren P, Yu Z.
europepmc +1 more source

