Evaluating Retinal Disease Diagnosis with an Interpretable Lightweight CNN Model Resistant to Adversarial Attacks. [PDF]
Bhandari M, Shahi TB, Neupane A.
europepmc +1 more source
Abstract This study investigates how small and medium‐sized enterprises (SMEs) respond to deglobalization and economic nationalism, using historical evidence from fascist Italy, a period of autarky and restricted international trade. While prior research has focused primarily on larger firms, especially multinational enterprises (MNEs), the strategic ...
Valeria Giacomin, Francesco Romagnoli
wiley +1 more source
Predicting facility-based delivery in Zanzibar: The vulnerability of machine learning algorithms to adversarial attacks. [PDF]
Tsai YT +4 more
europepmc +1 more source
Abstract Recruitment research has traditionally focused on how positive signals about organizations influence job seekers' perceptions and attraction to them, despite the fact that job seekers often encounter a mix of positive and negative information about prospective employers.
Keyan Lai, Kristina Potočnik
wiley +1 more source
Adversarial attacks on spiking convolutional neural networks for event-based vision. [PDF]
Büchel J +4 more
europepmc +1 more source
Effective faking of verbal deception detection with target‐aligned adversarial attacks
Abstract Background Deception detection through analysing language is a promising avenue using both human judgements and automated machine learning judgements. For both forms of credibility assessment, automated adversarial attacks that rewrite deceptive statements to appear truthful pose a serious threat.
Bennett Kleinberg +2 more
wiley +1 more source
Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach. [PDF]
Kansal K +5 more
europepmc +1 more source
Iran's Forward Defense in Sub‐Saharan Africa
Abstract This article examines Iran's security and defense initiatives in sub‐Saharan Africa between 1990 and 2024 and how they reflect the extraterritorial application of the regime's forward defense doctrine. In response to the long‐term erosion of its homeland defense capabilities since the Iran‐Iraq War of the 1980s—driven by infrastructure ...
Ariel Limanya Limbu, Ronen A. Cohen
wiley +1 more source
Toward leveraging intrinsic point cloud features in 3D adversarial attacks. [PDF]
Naderi H, Dinesh C, Bajić IV, Kasaei S.
europepmc +1 more source
Counterfactual Anonymous Quantum Teleportation in the Presence of Adversarial Attacks and Channel Noise. [PDF]
Nang Paing S +5 more
europepmc +1 more source

