Results 231 to 240 of about 14,798 (256)

SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation [PDF]

open access: gold
Amira Guesmi   +3 more
openalex   +1 more source

Viewing the Family Court Experiences of Affirming Parents and Their Transgender and Gender Diverse Children Through the Lens of Intersectionality

open access: yesJournal of Family Theory &Review, Volume 17, Issue 4, Page 851-863, December 2025.
ABSTRACT An intersectionality framework was utilized to investigate how sexism, racism, classism, and anti‐transgender bias played a role in one custody case involving a transgender child. This case study—the story of a Black Latina affirming mother, who underwent a seven‐year custody battle with the white father of their biracial transgender daughter ...
Katherine A. Kuvalanka   +3 more
wiley   +1 more source

From Hopeful Heroes to Cynical Martyrs: Identity Work and the Path‐Dependent Identification with Maladaptive Logics

open access: yesJournal of Management Studies, Volume 62, Issue 8, Page 3351-3385, December 2025.
Abstract Scholars have long attended to both the persistence and change of institutional logic–identity constellations, but we know less about why and how organizational members might cling to a logic despite its evident maladaptive character and the resulting emotional upheaval.
Lindie Botha, Ralph Hamann
wiley   +1 more source

Adversarial Machine Learning in Wireless Communications Using RF Data: A Review

IEEE Communications Surveys and Tutorials, 2023
Damilola Adesina   +2 more
exaly  

Generative Adversarial Networks (GANs)

ACM Computing Surveys, 2022
Divya Saxena, Jiannong Cao
exaly  

Generative Adversarial Networks

ACM Computing Surveys, 2022
Zhipeng Cai, Honghui Xu, Yi Pan
exaly  

Home - About - Disclaimer - Privacy