Results 141 to 150 of about 82,924 (315)

Traffic adversarial example attack and defense method based on explainable artificial intelligence

open access: yesTongxin xuebao
An adversarial example attack method based on XAI was proposed for AI-based NIDS. By identifying critical perturbation features with XAI and applying targeted perturbations while preserving traffic functionality, malicious traffic was gradually altered ...
MA Bowen   +4 more
doaj  

Research on adversarial attacks and defense performance of image classification models for automated driving systems

open access: yes机车电传动
Image classification models have been widely applied to facilitate functions such as autonomous perception and positioning for automated driving in many transportation systems, including automobiles, autonomous rail and urban rail transit systems ...
TANG Jun   +3 more
doaj  

After 50 Years of ‘Protocolization’, What Is the Progress Towards Munro's Image of a More Flexible, Innovative and ‘Child‐Centred’ English Child Protection System?

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Fifty years after the formation of England's child protection system, the country continues to reel from new instances of high‐profile child death tragedies where children have been harmed despite practitioners complying with the processes and procedures designed to protect them.
Ciarán Murphy, Michael Murphy
wiley   +1 more source

Children's Agency in Contact Disputes: Navigating Protection, Participation and Alienation

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This article examines how children's agency is framed, constrained and sometimes co‐opted within contested child arrangement proceedings, particularly in the context of alienation and coercive behaviours. Drawing on qualitative interviews with legal professionals in Northern Ireland, the study explores how statutory interventions, though well ...
Mairead McCormack
wiley   +1 more source

Family‐Led Decision‐Making Meetings as an Alternative to Initial Child Protection Conferences: Findings From a Realist Evaluation of the Safeguarding Family Group Conferencing Pilot in England

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Safeguarding Family Group Conferencing (FGC) is a family‐led decision‐making process offered to some families in England as an alternative to an Initial Child Protection Conference when Children's Services have safeguarding concerns. A realist evaluation was conducted within three local authorities piloting this approach to build understanding
Bekkah Bernheim   +5 more
wiley   +1 more source

Between Care and Control: Age Assessments and the Regulation of Unaccompanied and Asylum‐Seeking Children

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT This article offers a critical conceptual review of age assessments in England and examines their implications for unaccompanied asylum‐seeking children (UASC). Drawing on Foucault's theories of biopower and governmentality, age assessments are conceptualied as technologies of control that set the parameters for who is deemed ‘deserving’ of ...
Ama‐Rose Greaves
wiley   +1 more source

Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution [PDF]

open access: green, 2021
Zongyi Li   +7 more
openalex   +1 more source

Empowering Parents in Child Protection: An Evaluation of the Parental Advocacy and Information Service (PAIS) in Ireland

open access: yesChild &Family Social Work, EarlyView.
ABSTRACT Parental advocacy represents a crucial response to the marginalization of parents within child protection systems, aiming to empower them by amplifying their voices, ensuring their participation and supporting them through complex legal and bureaucratic processes.
Shane Powell   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy