Results 81 to 90 of about 8,712 (199)
BB-Patch: BlackBox Adversarial Patch-Attack using Zeroth-Order Optimization
Deep Learning has become popular due to its vast applications in almost all domains. However, models trained using deep learning are prone to failure for adversarial samples and carry a considerable risk in sensitive applications. Most of these adversarial attack strategies assume that the adversary has access to the training data, the model parameters,
Satyadwyoom Kumar +2 more
openaire +2 more sources
Abstract Recruitment research has traditionally focused on how positive signals about organizations influence job seekers' perceptions and attraction to them, despite the fact that job seekers often encounter a mix of positive and negative information about prospective employers.
Keyan Lai, Kristina Potočnik
wiley +1 more source
Effective faking of verbal deception detection with target‐aligned adversarial attacks
Abstract Background Deception detection through analysing language is a promising avenue using both human judgements and automated machine learning judgements. For both forms of credibility assessment, automated adversarial attacks that rewrite deceptive statements to appear truthful pose a serious threat.
Bennett Kleinberg +2 more
wiley +1 more source
A Texture-Guided Adversarial Defense Framework Against Deepfake Generation
Deepfakes are an increasing danger to the reliability of digital media, with several detection algorithms developed to identify manipulated content. Although detection approaches continue to improve, proactive defenses that protect images by embedding ...
Maryam Bukhari +3 more
doaj +1 more source
James Lyman Merrick's Aborted “Mission to the Mohammedans of Persia”
Abstract James Lyman Merrick (1803‐1866) served as a missionary of the American Board of Commissioners for Foreign Missions (ABCFM) in Persia between 1835 and 1845. He was America's first missionary to the Muslim world. Based on his field research on the Persians’ religious beliefs, he correctly predicted that the conversion of Persia's Muslims into ...
Hooman Estelami
wiley +1 more source
DIFFender: Diffusion-Based Adversarial Defense Against Patch Attacks
Adversarial attacks, particularly patch attacks, pose significant threats to the robustness and reliability of deep learning models. Developing reliable defenses against patch attacks is crucial for real-world applications. This paper introduces DIFFender, a novel defense framework that harnesses the capabilities of a text-guided diffusion model to ...
Caixin Kang +6 more
openaire +2 more sources
Coalition Breakdown and Subsystem Exit
ABSTRACT Why actors choose to work together (or not) to advance policy has been the central area of inquiry within the Advocacy Coalition Framework (ACF). Existing research has mainly emphasized the pathway towards coalition formation and evolution, underscoring the stable patterns of allies and opponents observable in policy processes over a decade or
Charlie F. Thompson
wiley +1 more source
Robust Object Detection Under Adversarial Patch Attacks in Vision-Based Navigation
In vision-guided autonomous robots, object detectors play a crucial role in perceiving the environment for path planning and decision-making. However, adaptive adversarial patch attacks undermine the resilience of detector-based systems.
Haotian Gu +2 more
doaj +1 more source
Abstract Intergroup contact is one of the most established approaches for improving relations between adversary groups in conflict settings; yet little is known about whether its effects might be shaped by the social context. In this paper, we examine whether pre‐war contact opportunity with the adversary group shapes the relationship between post‐war ...
Zaur Afandiyev +3 more
wiley +1 more source
Building centaur responders: is emergency management ready for artificial intelligence?
Abstract This article examines the preparedness of emergency management (EM) for addressing questions pertaining to artificial intelligence (AI), encompassing its benefits to EM missions, the potential biases, the societal impacts, and more. We pinpoint two key shortcomings in early EM research on AI: (i) insufficient discussion of both AI's history ...
Christopher Whyte +1 more
wiley +1 more source

