Results 1 to 10 of about 22,784,147 (354)

Adversarial System Variant Approximation to Quantify Process Model Generalization [PDF]

open access: goldIEEE Access, 2020
In process mining, process models are extracted from event logs using process discovery algorithms and are commonly assessed using multiple quality metrics.
Julian Theis, Houshang Darabi
openalex   +3 more sources

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack [PDF]

open access: greenIEEE International Conference on Computer Vision, 2023
In autonomous driving (AD), accurate perception is indispensable to achieving safe and secure driving. Due to its safety-criticality, the security of AD perception has been widely studied.
Ningfei Wang   +4 more
openalex   +3 more sources

Subsidiary Prosecution in Adversarial System

open access: yesIzvestiya of Altai State University, 2017
Рассматривается осуществление потерпевшим функции уголовного преследования в контексте обеспечения состязательных начал в уголовном судопроизводстве.
G. N. Vetrova
openaire   +3 more sources

The Principle of Adversarial System in Canon Law and Polish Law – Outline of the Issues [PDF]

open access: diamondSocietas et Iurisprudentia
This paper attempts to describe the meaning and role of the adversarial system principle in the canon law against the background of the Polish law. The eponymous issue of the adversarial system was analysed using a comparative legal method, which makes ...
Maciej Andrzejewski
doaj   +2 more sources

Physically constrained generative adversarial networks for improving precipitation fields from Earth system models [PDF]

open access: yesNature Machine Intelligence, 2022
Precipitation results from complex processes across many scales, making its accurate simulation in Earth system models (ESMs) challenging. Existing post-processing methods can improve ESM simulations locally but cannot correct errors in modelled spatial ...
P. Hess   +4 more
semanticscholar   +1 more source

An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks

open access: yesIEEE Internet of Things Journal, 2023
As communication technology advances, various and heterogeneous data are communicated in distributed environments through network systems. Meanwhile, along with the development of communication technology, the attack surface has expanded, and concerns ...
Cheolhee Park   +5 more
semanticscholar   +1 more source

Editorial – An overview on the “crisis” of testimonial evidence as a judicial decision making tool, between ECHR and Italian Criminal Proceeding:

open access: yesRevista Brasileira de Direito Processual Penal, 2022
We know that science is a precious ally for the judge in the search for truth. But we also know that every coin has its flipside. Science can in fact constitute a false ally for the judge, dangerously channeling the process towards judicial error.
Pier Paolo Paulesu
doaj   +1 more source

Adversary Aware Surveillance Systems [PDF]

open access: yesIEEE Transactions on Information Forensics and Security, 2009
We consider surveillance problems to be a set of system-adversary interaction problems in which an adversary can be modeled as a rational (selfish) agent trying to maximize his utility. We feel that appropriate adversary modeling can provide deep insights into the system performance and also clues for optimizing the system's performance against the ...
Singh, V.K., Kankanhalli, M.S.
openaire   +2 more sources

Attack on Practical Speaker Verification System Using Universal Adversarial Perturbations [PDF]

open access: yesIEEE International Conference on Acoustics, Speech, and Signal Processing, 2021
In authentication scenarios, applications of practical speaker verification systems usually require a person to read a dynamic authentication text. Previous studies played an audio adversarial example as a digital signal to perform physical attacks ...
Weiyi Zhang   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy