Adversarial attacks dataset for low light image enhancement. [PDF]
Martinez A +4 more
europepmc +1 more source
A Word-Granular Adversarial Attacks Framework for Causal Event Extraction. [PDF]
Zhao Y +5 more
europepmc +1 more source
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification [PDF]
Anthony Etim, Jakub Szefer
openalex +1 more source
Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink
Ranjie Duan +6 more
openalex +2 more sources
Effective faking of verbal deception detection with target‐aligned adversarial attacks
Abstract Background Deception detection through analysing language is a promising avenue using both human judgements and automated machine learning judgements. For both forms of credibility assessment, automated adversarial attacks that rewrite deceptive statements to appear truthful pose a serious threat.
Bennett Kleinberg +2 more
wiley +1 more source
Mobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks. [PDF]
Oda J, Takemoto K.
europepmc +1 more source
Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks. [PDF]
Wu W +9 more
europepmc +1 more source
Maritime Disruption in Yemen: The Making of a Hybrid Red Sea Order
Abstract Since late 2023, Houthi forces in Yemen have employed drones and missiles to disrupt commercial shipping in the Bab al‐Mandeb Strait, necessitating global rerouting and prompting multilateral naval responses. These events challenge the conventional view that the land domain is fragmented and prone to conflict, while the maritime domain is ...
Federico Donelli
wiley +1 more source
Mitigating opinion polarization in social networks using adversarial attacks. [PDF]
Ninomiya M +3 more
europepmc +1 more source
Differentiable sampling of molecular geometries with uncertainty-based adversarial attacks. [PDF]
Schwalbe-Koda D +2 more
europepmc +1 more source

