A comprehensive survey of deep face verification systems adversarial attacks and defense strategies. [PDF]
Kilany S, Mahfouz A.
europepmc +1 more source
Collaborative penetration testing suite for emerging generative AI algorithms. [PDF]
Radanliev P.
europepmc +1 more source
Prosecutors, public defenders, and the American adversarial system
Timothy Patrick Hennessy
openalex +1 more source
Adversarial susceptibility analysis for water quality prediction models. [PDF]
Zalte J, Rai A, Shah H, Fulekar MH.
europepmc +1 more source
An incremental adversarial training method enables timeliness and rapid new knowledge acquisition. [PDF]
Ge Y, Dong Y, Sun H, Liu Y, Wang C.
europepmc +1 more source
“Adversarial Quantum-Clustering” A New Methodological Approach to Social Systems Modeling
Nicolás Persico
openalex +1 more source
LatAtk: A Medical Image Attack Method Focused on Lesion Areas with High Transferability. [PDF]
Li L +5 more
europepmc +1 more source
Steering polarization toward consensus in signed majority-vote opinion models. [PDF]
Chujyo M, Liu S, Toriumi F.
europepmc +1 more source
HMOA-GNN: adaptive adversarial GraphSAGE with hierarchical hybrid sampling and metric-optimized graph construction for credit card fraud detection. [PDF]
Ni L +5 more
europepmc +1 more source
Adversarial Learning of Knowledge Embeddings for the Unified Medical Language System.
Ramón Maldonado +2 more
openalex +1 more source

