Results 191 to 200 of about 16,308 (300)

Enhancing Cyber Security of LoRaWAN Gateways under Adversarial Attacks. [PDF]

open access: yesSensors (Basel), 2022
Mohamed A   +6 more
europepmc   +1 more source

Effect of transformations on the success of adversarial attacks for Clipped BagNet and ResNet image classifiers

open access: diamond, 2022
Ekaterina Olegovna Kurdenkova   +3 more
openalex   +2 more sources

User‐Based Evaluation of Explainability Techniques for Misogyny Detection in Code‐Mixed Hindi–English

open access: yesApplied AI Letters, Volume 7, Issue 2, June 2026.
In this work, we have performed human‐based evaluation of three post hoc explainability techniques, Local Interpretable Model Agnostic Explanations (LIME), Shapely Additive Explanations (SHAP), and integrated Gradients (IG) for a multilingual Bidirectional Encoder Representations from Transformers (mBERT) based binary and multi‐label misogyny ...
Sargam Yadav   +2 more
wiley   +1 more source

Adversarial attacks dataset for low light image enhancement. [PDF]

open access: yesData Brief
Martinez A   +4 more
europepmc   +1 more source

A Word-Granular Adversarial Attacks Framework for Causal Event Extraction. [PDF]

open access: yesEntropy (Basel), 2022
Zhao Y   +5 more
europepmc   +1 more source

Beyond Democratic Backsliding: Bureaucracy, Elite Dynamics and Administrative Change in Authoritarian Transitions

open access: yesGovernance, Volume 39, Issue 2, April 2026.
ABSTRACT This paper examines how political and administrative elites shape regime transformations under authoritarian rule, proposing an elite‐centered analytical perspective that complements prevailing accounts of “democratic backsliding.” We show how embedding political–administrative relations within a broader elite‐theoretical framework clarifies ...
Kutsal Yesilkagit, Johan Christensen
wiley   +1 more source

Stabilizing deep tomographic reconstruction: Part B. Convergence analysis and adversarial attacks. [PDF]

open access: yesPatterns (N Y), 2022
Wu W   +9 more
europepmc   +1 more source

Home - About - Disclaimer - Privacy