Results 191 to 200 of about 16,308 (300)
FP-ZOO: Fast Patch-Based Zeroth Order Optimization for Black-Box Adversarial Attacks on Vision Models. [PDF]
Seo J, Jeon S.
europepmc +1 more source
Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks. [PDF]
Mohamed A +6 more
europepmc +1 more source
In this work, we have performed human‐based evaluation of three post hoc explainability techniques, Local Interpretable Model Agnostic Explanations (LIME), Shapely Additive Explanations (SHAP), and integrated Gradients (IG) for a multilingual Bidirectional Encoder Representations from Transformers (mBERT) based binary and multi‐label misogyny ...
Sargam Yadav +2 more
wiley +1 more source
Adversarial attacks dataset for low light image enhancement. [PDF]
Martinez A +4 more
europepmc +1 more source
A Word-Granular Adversarial Attacks Framework for Causal Event Extraction. [PDF]
Zhao Y +5 more
europepmc +1 more source
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems [PDF]
Jiaxi Tang, Hongyi Wen, Ke Wang
openalex +1 more source
ABSTRACT This paper examines how political and administrative elites shape regime transformations under authoritarian rule, proposing an elite‐centered analytical perspective that complements prevailing accounts of “democratic backsliding.” We show how embedding political–administrative relations within a broader elite‐theoretical framework clarifies ...
Kutsal Yesilkagit, Johan Christensen
wiley +1 more source
Mitigating opinion polarization in social networks using adversarial attacks. [PDF]
Ninomiya M +3 more
europepmc +1 more source
Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks. [PDF]
Wu W +9 more
europepmc +1 more source

