Arm's‐Length Agencies and Authorities in Canada: Charting the Next Frontier of Research
Canadian Public Administration, EarlyView.
Carey Doberstein
wiley +1 more source
ABSTRACT How do the strategies that governments employ when they encounter crisis‐induced turbulence affect the robustness of the political regime in which they operate? Comparative studies of the connection between government strategies and political regime robustness under different cultural and institutional conditions are few and far between.
Eva Sørensen +5 more
wiley +1 more source
Evaluating gait system vulnerabilities through PPO and GAN-generated adversarial attacks. [PDF]
Saoudi EM, Jaafari J, Jai Andaloussi S.
europepmc +1 more source
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks. [PDF]
Ding K +6 more
europepmc +1 more source
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
Hybrid framework for image forgery detection and robustness against adversarial attacks using vision transformer and SVM. [PDF]
Abdelmaksoud M +3 more
europepmc +1 more source
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies. [PDF]
Kilany S, Mahfouz A.
europepmc +1 more source
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems. [PDF]
Anastasiou T +6 more
europepmc +1 more source
A Survey for Deep Reinforcement Learning Based Network Intrusion Detection
This paper surveys deep reinforcement learning (DRL) for network intrusion detection, evaluating model efficiency, minority attack detection, and dataset imbalance. Findings show DRL achieves state‐of‐the‐art results on public datasets, sometimes surpassing traditional deep learning.
Wanrong Yang +3 more
wiley +1 more source

