Results 191 to 200 of about 1,209,773 (317)
Abstract This study investigates how small and medium‐sized enterprises (SMEs) respond to deglobalization and economic nationalism, using historical evidence from fascist Italy, a period of autarky and restricted international trade. While prior research has focused primarily on larger firms, especially multinational enterprises (MNEs), the strategic ...
Valeria Giacomin, Francesco Romagnoli
wiley +1 more source
Adversarial attacks on spiking convolutional neural networks for event-based vision. [PDF]
Büchel J +4 more
europepmc +1 more source
Temporal Shuffling for Defending Deep Action Recognition Models against Adversarial Attacks [PDF]
Jaehui Hwang +4 more
openalex +1 more source
Effective faking of verbal deception detection with target‐aligned adversarial attacks
Abstract Background Deception detection through analysing language is a promising avenue using both human judgements and automated machine learning judgements. For both forms of credibility assessment, automated adversarial attacks that rewrite deceptive statements to appear truthful pose a serious threat.
Bennett Kleinberg +2 more
wiley +1 more source
Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach. [PDF]
Kansal K +5 more
europepmc +1 more source
Dialogue of the Deaf: How Deliberation With Discontented Citizens May Hopelessly Fail
ABSTRACT Governments employ public deliberation in response to citizen discontent, intending to achieve consensus, mutual understanding, and clarification. However, some studies suggest that deliberation can devolve into a “dialogue of the deaf,” where parties talk past each other, counterproductively leading to conflict, distrust, and confusion ...
Anouk van Twist
wiley +1 more source
Enhancing the robustness of vision transformer defense against adversarial attacks based on squeeze-and-excitation module. [PDF]
Chang Y, Zhao H, Wang W.
europepmc +1 more source
ABSTRACT Artificial intelligence (AI) is increasingly used in public decision‐making; yet existing governance tools often lack clear definitions of harm and benefit, practical methods for weighing competing values, and guidance for resolving value conflicts.
Karl de Fine Licht, Anna Folland
wiley +1 more source
Counterfactual Anonymous Quantum Teleportation in the Presence of Adversarial Attacks and Channel Noise. [PDF]
Nang Paing S +5 more
europepmc +1 more source
ABSTRACT How do the strategies that governments employ when they encounter crisis‐induced turbulence affect the robustness of the political regime in which they operate? Comparative studies of the connection between government strategies and political regime robustness under different cultural and institutional conditions are few and far between.
Eva Sørensen +5 more
wiley +1 more source

