Results 161 to 170 of about 14,798 (256)

Adversarial attacks dataset for low light image enhancement. [PDF]

open access: yesData Brief
Martinez A   +4 more
europepmc   +1 more source

A Word-Granular Adversarial Attacks Framework for Causal Event Extraction. [PDF]

open access: yesEntropy (Basel), 2022
Zhao Y   +5 more
europepmc   +1 more source

Adversarial Laser Beam: Effective Physical-World Attack to DNNs in a Blink

open access: green, 2021
Ranjie Duan   +6 more
openalex   +2 more sources

Effective faking of verbal deception detection with target‐aligned adversarial attacks

open access: yesLegal and Criminological Psychology, EarlyView.
Abstract Background Deception detection through analysing language is a promising avenue using both human judgements and automated machine learning judgements. For both forms of credibility assessment, automated adversarial attacks that rewrite deceptive statements to appear truthful pose a serious threat.
Bennett Kleinberg   +2 more
wiley   +1 more source

Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks. [PDF]

open access: yesPatterns (N Y), 2022
Wu W   +9 more
europepmc   +1 more source

Maritime Disruption in Yemen: The Making of a Hybrid Red Sea Order

open access: yesMiddle East Policy, EarlyView.
Abstract Since late 2023, Houthi forces in Yemen have employed drones and missiles to disrupt commercial shipping in the Bab al‐Mandeb Strait, necessitating global rerouting and prompting multilateral naval responses. These events challenge the conventional view that the land domain is fragmented and prone to conflict, while the maritime domain is ...
Federico Donelli
wiley   +1 more source

Home - About - Disclaimer - Privacy