Results 1 to 10 of about 221,728 (275)

Adversarial Systems and Adversarial Mindsets: Do We Need Either? [PDF]

open access: diamondBond Law Review, 2003
extract] The styles of teaching and studying law in civilian and common law jurisdictions are very different. In the context of a desire to make civil procedure in common law jurisdictions less adversarial, the greater emphasis on case based learning in the common law world is striking.
William van Caenegem
openaire   +5 more sources

Adversary Aware Surveillance Systems [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2009
We consider surveillance problems to be a set of system-adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his utility. We feel that appropriate adversary modeling can provide deep insights into the system performance and also clues for optimizing the system's performance against the ...
Singh, V.K., Kankanhalli, M.S.
openaire   +2 more sources

Resilient Distributed Energy Management for Systems of Interconnected Microgrids [PDF]

open access: yes, 2018
In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply ...
Ananduta, Wicak   +3 more
core   +2 more sources

Structured Proofs for Adversarial Cyber-Physical Systems [PDF]

open access: yesACM Transactions on Embedded Computing Systems, 2021
Many cyber-physical systems (CPS) are safety-critical, so it is important to formally verify them, e.g. in formal logics that show a model’s correctness specification always holds. Constructive Differential Game Logic ( CdGL ) is such a logic for (constructive) hybrid ...
Rose Bohrer, André Platzer
openaire   +5 more sources

Mergers, Litigation and Efficiency [PDF]

open access: yes, 2006
We consider antitrust enforcement within the adversarial model used by the United States. We show that, under the adversarial system, the Antitrust Authority may try to prohibit mergers also in those cases in which litigation is inefficient.
Gürtler, Oliver, Kräkel, Matthias
core   +3 more sources

The Adversarial Myth: Appellate Court Extra-Record Factfinding [PDF]

open access: yes, 2011
The United States\u27 commitment to adversarial justice is a defining feature of its legal system. Standing doctrine, for example, is supposed to ensure that courts can rely on adverse parties to present the facts courts need to resolve disputes ...
Gorod, Brianne J.
core   +3 more sources

Adversarial Learning for Neural Dialogue Generation

open access: yes, 2017
In this paper, drawing intuition from the Turing test, we propose using adversarial training for open-domain dialogue generation: the system is trained to produce sequences that are indistinguishable from human-generated dialogue utterances.
Jean, Sébastien   +5 more
core   +1 more source

Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems

open access: yes, 2019
We show that end-to-end learning of communication systems through deep neural network (DNN) autoencoders can be extremely vulnerable to physical adversarial attacks.
Larsson, Erik G., Sadeghi, Meysam
core   +1 more source

Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks

open access: yes, 2018
This work shows that it is possible to fool/attack recent state-of-the-art face detectors which are based on the single-stage networks. Successfully attacking face detectors could be a serious malware vulnerability when deploying a smart surveillance ...
D Chen   +5 more
core   +1 more source

Online Adversarial Stabilization of Unknown Networked Systems

open access: yesACM SIGMETRICS Performance Evaluation Review, 2023
We investigate the problem of stabilizing an unknown networked linear system under communication constraints and adversarial disturbances. We propose the first provably stabilizing algorithm for the problem. The algorithm uses a distributed version of nested convex body chasing to maintain a consistent estimate of the network dynamics and applies ...
Jing Yu, Dimitar Ho, Adam Wierman
openaire   +4 more sources

Home - About - Disclaimer - Privacy