Results 131 to 140 of about 82,924 (315)
Ensemble Adversarial Training: Attacks and Defenses [PDF]
Tram\`er, Florian +5 more
openalex +2 more sources
Struggle with Adversarial Defense? Try Diffusion
Adversarial attacks induce misclassification by introducing subtle perturbations. Recently, diffusion models are applied to the image classifiers to improve adversarial robustness through adversarial training or by purifying adversarial noise. However, diffusion-based adversarial training often encounters convergence challenges and high computational ...
Yujie Li +6 more
openaire +2 more sources
Western Balkans as the Frontline of Russian Hybrid Warfare
ABSTRACT Hybrid warfare (HW) scholarship acknowledges the phenomenon's contextual and temporal specificity, yet its dominant conceptual framing has generated a literature largely centred on identifying and categorising hybrid activities. This focus has left the contextual vulnerabilities that enable hybrid threats (HTs) and shape an adversary's ...
Vesna Bojicic‐Dzelilovic
wiley +1 more source
Countering FIMI by Digital Authoritarianisms: Audience Architecture and Reverse Language Engineering
ABSTRACT Foreign information manipulation and interference (FIMI) campaigns on social media are currently both more accessible and more impactful than the North Atlantic Treaty Organization's (NATO) or European Union's (EU), offering their opponents superiority and efficiency on those platforms.
Michelangelo Conoscenti
wiley +1 more source
Defense Method against Adversarial Attacks Using JPEG Compression and One-Pixel Attack for Improved Dataset Security [PDF]
Adelina-Valentina Cucu +5 more
openalex +1 more source
ABSTRACT This paper draws on the social control and sensemaking literatures to study how a Big 4 audit firm in the Netherlands sought to contest the national oversight body's inspection findings on one of its audit engagements. Our case study leads us to develop the concept of professional ambiguity to capture the multiple, coexisting meanings and ...
Wendy Groot, Dominic Detzen, Anna Gold
wiley +1 more source
The exploration and implementation of brain-computer interfaces (BCIs) utilizing electro- encephalography (EEG) are becoming increasingly widespread. However, their safety considerations have received scant attention.
Yongting Ding, Lin Li, Qingyan Li
doaj +1 more source
The choice argument for proportional representation
Abstract What electoral system should a democracy choose? I argue for proportional representation (PR). My main empirical premise is Duverger's law: Under PR there are more viable candidates in district‐level elections than there are under single‐member plurality (SMP) systems.
Adam Lovett
wiley +1 more source
Leveraging Attack Non-Transferability to Boost Adversarial Robustness for Foundation Models
This paper presents a novel adversarial defense framework that strategically exploits the non-transferability of adversarial attacks across multi-modal foundation models.
Koshiro Toishi +4 more
doaj +1 more source
Strategic litigation as a challenge for deliberative democracy
Abstract Strategic litigation is a growing public concern, but remains understudied in democratic theory. In strategic litigation, collectives go to court with a political agenda that goes beyond their specific case. How should we assess the legitimacy of strategic litigation? Building on Lafont's model of deliberative democracy and Klein's distinction
Svenja Ahlhaus
wiley +1 more source

