Words After the Storm: Elite Rhetoric and the Limits of De‐Escalation in Postreferendum Catalonia
ABSTRACT When does a secessionist crisis end? What drives political elites to shift from hostility to moderation? This article examines the prospects of rhetorical de‐escalation in the aftermath of a secessionist dispute through the paradigmatic case of Catalonia.
Daniel Cetrà +3 more
wiley +1 more source
Counterfactual Anonymous Quantum Teleportation in the Presence of Adversarial Attacks and Channel Noise. [PDF]
Nang Paing S +5 more
europepmc +1 more source
TransFool: An Adversarial Attack against Neural Machine Translation Models [PDF]
Sahar Sadrizadeh +2 more
openalex +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Enhancing the robustness of vision transformer defense against adversarial attacks based on squeeze-and-excitation module. [PDF]
Chang Y, Zhao H, Wang W.
europepmc +1 more source
Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks [PDF]
Jaehui Hwang +4 more
openalex +1 more source
Transform-Dependent Adversarial Attacks
Deep networks are highly vulnerable to adversarial attacks, yet conventional attack methods utilize static adversarial perturbations that induce fixed mispredictions. In this work, we exploit an overlooked property of adversarial perturbations--their dependence on image transforms--and introduce transform-dependent adversarial attacks.
Tan, Yaoteng +2 more
openaire +2 more sources
ABSTRACT Artificial intelligence (AI) is increasingly used in public decision‐making; yet existing governance tools often lack clear definitions of harm and benefit, practical methods for weighing competing values, and guidance for resolving value conflicts.
Karl de Fine Licht, Anna Folland
wiley +1 more source
The strength of Nesterov's accelerated gradient in boosting transferability of stealthy adversarial attacks. [PDF]
Lin C, Long S.
europepmc +1 more source
Transferability of features for neural networks links to adversarial attacks and defences. [PDF]
Kotyan S, Matsuki M, Vargas DV.
europepmc +1 more source

