Results 151 to 160 of about 1,209,773 (317)

Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain

open access: yesIEEE Access
In recent years, CNN-based object detectors have been widely adopted in autonomous systems. Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks.
Phornphawit Manasut   +5 more
doaj   +1 more source

Robustness Against Adversarial Attacks Via Learning Confined Adversarial Polytopes

open access: yesICASSP 2024 - 2024 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
Comment: The paper has been accepted in ICASSP ...
Hamidi, Shayan Mohajer, Ye, Linfeng
openaire   +2 more sources

A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy

open access: yesGlobal Policy, EarlyView.
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley   +1 more source

Adversarial Attacks on Medical Image Classification. [PDF]

open access: yesCancers (Basel), 2023
Tsai MJ, Lin PY, Lee ME.
europepmc   +1 more source

Structack: Structure-based Adversarial Attacks on Graph Neural Networks [PDF]

open access: gold, 2021
Hussain Hussain   +5 more
openalex   +1 more source

South Africa: The Ambiguities of a Middle Power

open access: yesGlobal Policy, EarlyView.
ABSTRACT South Africa represents an interesting species of a middle power. This derives from its inherited economic muscle as Africa's powerhouse and the liberation struggle against apartheid, both of which have shaped its democratic transition. The traditions of liberation and democracy, in turn, have profoundly influenced how South Africa has ...
Garth L. le Pere
wiley   +1 more source

Rethinking the contract‐failure theory

open access: yesAmerican Business Law Journal, EarlyView.
Abstract The contract‐failure theory posits that the nonprofit form can be an indicator of high product quality because the nondistribution constraint reduces the nonprofit manager's financial benefits from cheating. This would give nonprofits an advantage over for‐profit firms when consumers cannot determine product quality and thus explains ...
Yumiao Wang
wiley   +1 more source

Local imperceptible adversarial attacks against human pose estimation networks. [PDF]

open access: yesVis Comput Ind Biomed Art, 2023
Liu F, Zhang S, Wang H, Yan C, Miao Y.
europepmc   +1 more source

Boosting Adversarial Transferability Through Adversarial Attack Enhancer

open access: yesApplied Sciences
Adversarial attacks against deep learning models achieve high performance in white-box settings but often exhibit low transferability in black-box scenarios, especially against defended models. In this work, we propose Multi-Path Random Restart (MPRR), which initializes multiple restart points with random noise to optimize gradient updates and improve ...
Wenli Zeng, Hong Huang, Jixin Chen
openaire   +1 more source

Strategic litigation as a challenge for deliberative democracy

open access: yesAmerican Journal of Political Science, EarlyView.
Abstract Strategic litigation is a growing public concern, but remains understudied in democratic theory. In strategic litigation, collectives go to court with a political agenda that goes beyond their specific case. How should we assess the legitimacy of strategic litigation? Building on Lafont's model of deliberative democracy and Klein's distinction
Svenja Ahlhaus
wiley   +1 more source

Home - About - Disclaimer - Privacy