Results 81 to 90 of about 82,924 (315)
ABSTRACT Despite growing public knowledge of false confession cases, research with students and community members continues to find that people assume confessions indicate guilt. The present research explored the implications of belief perseverance: the tendency to maintain a belief even when confronted with compelling contradictory evidence.
Taya D. Henry +2 more
wiley +1 more source
Adversarial defenses via vector quantization
This is the author-accepted version of our paper published in Neurocomputing.
Zhiyi Dong, Yongyi Mao
openaire +2 more sources
Applying the Rules of Evidence to Expert Testimony About Risk
ABSTRACT Expert opinion about dangerousness or risk is common at sentencing, criminal commitment proceedings and some types of pretrial detention hearings. This article argues that such evidence must be (1) “material” (logically relevant, empirically generalizable, and epistemologically germane), (2) “probative” (a measure of accuracy, which is ...
Christopher Slobogin
wiley +1 more source
By manipulating current and voltage measurements, an assailant can induce unwanted relay action while attempting to avoid detection. Detecting advanced cyber intrusions in power protection environments requires specialised data analysis and anomaly detection methods.
Feras Alasali +6 more
wiley +1 more source
A Deep Learning Framework for Forecasting Medium‐Term Covariance in Multiasset Portfolios
ABSTRACT Forecasting the covariance matrix of asset returns is central to portfolio construction, risk management, and asset pricing. However, most existing models struggle at medium‐term horizons, several weeks to months, where shifting market regimes and slower dynamics prevail.
Pedro Reis, Ana Paula Serra, João Gama
wiley +1 more source
Automatic modulation classification models based on deep learning models are at risk of being interfered by adversarial attacks. In an adversarial attack, the attacker causes the classification model to misclassify the received signal by adding carefully
Fanghao Xu +5 more
doaj +1 more source
PuVAE: A Variational Autoencoder to Purify Adversarial Examples
Deep neural networks are widely used and exhibit excellent performance in many areas. However, they are vulnerable to adversarial attacks that compromise networks at inference time by applying elaborately designed perturbations to input data.
Uiwon Hwang +4 more
doaj +1 more source
Adversarial Traces for Website Fingerprinting Defense [PDF]
Website Fingerprinting (WF) is a traffic analysis attack that enables an eavesdropper to infer the victim's web activity even when encrypted and even when using the Tor anonymity system. Using deep learning classifiers, the attack can reach up to 98% accuracy.
Mohsen Imani +2 more
openaire +1 more source
Knowledge sourcing, geopolitics, and FDI: An empirical analysis on the US green and digital sectors
Abstract Research Summary This paper examines how foreign direct investment (FDI) shapes firms' sourcing of knowledge in the digital and green domains under rising geopolitical frictions. We assemble a firm–country dyadic panel (2013–2020) linking US patent backward citations to firms' FDI, enriched with bilateral geopolitical distance and host‐country
Alberto Maria Radici
wiley +1 more source
Attention, Please! Adversarial Defense via Attention Rectification and Preservation
This study provides a new understanding of the adversarial attack problem by examining the correlation between adversarial attack and visual attention change.
Jing, Liping +6 more
core

