Results 141 to 150 of about 82,924 (315)
Traffic adversarial example attack and defense method based on explainable artificial intelligence
An adversarial example attack method based on XAI was proposed for AI-based NIDS. By identifying critical perturbation features with XAI and applying targeted perturbations while preserving traffic functionality, malicious traffic was gradually altered ...
MA Bowen +4 more
doaj
Image classification models have been widely applied to facilitate functions such as autonomous perception and positioning for automated driving in many transportation systems, including automobiles, autonomous rail and urban rail transit systems ...
TANG Jun +3 more
doaj
ABSTRACT Fifty years after the formation of England's child protection system, the country continues to reel from new instances of high‐profile child death tragedies where children have been harmed despite practitioners complying with the processes and procedures designed to protect them.
Ciarán Murphy, Michael Murphy
wiley +1 more source
Children's Agency in Contact Disputes: Navigating Protection, Participation and Alienation
ABSTRACT This article examines how children's agency is framed, constrained and sometimes co‐opted within contested child arrangement proceedings, particularly in the context of alienation and coercive behaviours. Drawing on qualitative interviews with legal professionals in Northern Ireland, the study explores how statutory interventions, though well ...
Mairead McCormack
wiley +1 more source
ABSTRACT Safeguarding Family Group Conferencing (FGC) is a family‐led decision‐making process offered to some families in England as an alternative to an Initial Child Protection Conference when Children's Services have safeguarding concerns. A realist evaluation was conducted within three local authorities piloting this approach to build understanding
Bekkah Bernheim +5 more
wiley +1 more source
Adversarial Machine Learning Attacks and Defense Methods in the Cyber\n Security Domain [PDF]
Rosenberg, Ihai +3 more
openalex +1 more source
Defense Against Adversarial Attacks using Convolutional Auto-Encoders [PDF]
Shreyasi Mandal
openalex +1 more source
ABSTRACT This article offers a critical conceptual review of age assessments in England and examines their implications for unaccompanied asylum‐seeking children (UASC). Drawing on Foucault's theories of biopower and governmentality, age assessments are conceptualied as technologies of control that set the parameters for who is deemed ‘deserving’ of ...
Ama‐Rose Greaves
wiley +1 more source
Searching for an Effective Defender: Benchmarking Defense against Adversarial Word Substitution [PDF]
Zongyi Li +7 more
openalex +1 more source
ABSTRACT Parental advocacy represents a crucial response to the marginalization of parents within child protection systems, aiming to empower them by amplifying their voices, ensuring their participation and supporting them through complex legal and bureaucratic processes.
Shane Powell +3 more
wiley +1 more source

