Results 151 to 160 of about 1,209,773 (317)
Investigating the Transferability of TOG Adversarial Attacks in YOLO Models in the Maritime Domain
In recent years, CNN-based object detectors have been widely adopted in autonomous systems. Although their capabilities are employed across various industries, these detectors are inherently susceptible to adversarial attacks.
Phornphawit Manasut +5 more
doaj +1 more source
Robustness Against Adversarial Attacks Via Learning Confined Adversarial Polytopes
Comment: The paper has been accepted in ICASSP ...
Hamidi, Shayan Mohajer, Ye, Linfeng
openaire +2 more sources
A “Tech First” Approach to Foreign Policy? The Three Meanings of Tech Diplomacy
ABSTRACT Scholars have recently argued that international politics is plagued by instability as the world rapidly transitions from one crisis to another. This state of “Permacrisis,” or permanent crises between states, is driven by technological innovations which create new kinds of crises and drive competitions between adversarial states.
Ilan Manor
wiley +1 more source
Adversarial Attacks on Medical Image Classification. [PDF]
Tsai MJ, Lin PY, Lee ME.
europepmc +1 more source
Structack: Structure-based Adversarial Attacks on Graph Neural Networks [PDF]
Hussain Hussain +5 more
openalex +1 more source
South Africa: The Ambiguities of a Middle Power
ABSTRACT South Africa represents an interesting species of a middle power. This derives from its inherited economic muscle as Africa's powerhouse and the liberation struggle against apartheid, both of which have shaped its democratic transition. The traditions of liberation and democracy, in turn, have profoundly influenced how South Africa has ...
Garth L. le Pere
wiley +1 more source
Rethinking the contract‐failure theory
Abstract The contract‐failure theory posits that the nonprofit form can be an indicator of high product quality because the nondistribution constraint reduces the nonprofit manager's financial benefits from cheating. This would give nonprofits an advantage over for‐profit firms when consumers cannot determine product quality and thus explains ...
Yumiao Wang
wiley +1 more source
Local imperceptible adversarial attacks against human pose estimation networks. [PDF]
Liu F, Zhang S, Wang H, Yan C, Miao Y.
europepmc +1 more source
Boosting Adversarial Transferability Through Adversarial Attack Enhancer
Adversarial attacks against deep learning models achieve high performance in white-box settings but often exhibit low transferability in black-box scenarios, especially against defended models. In this work, we propose Multi-Path Random Restart (MPRR), which initializes multiple restart points with random noise to optimize gradient updates and improve ...
Wenli Zeng, Hong Huang, Jixin Chen
openaire +1 more source
Strategic litigation as a challenge for deliberative democracy
Abstract Strategic litigation is a growing public concern, but remains understudied in democratic theory. In strategic litigation, collectives go to court with a political agenda that goes beyond their specific case. How should we assess the legitimacy of strategic litigation? Building on Lafont's model of deliberative democracy and Klein's distinction
Svenja Ahlhaus
wiley +1 more source

