Results 11 to 20 of about 227,956 (276)
DroidEnemy: Battling adversarial example attacks for Android malware detection
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala +5 more
doaj +1 more source
In this work, we propose a novel defense system against adversarial examples leveraging the unique power of Generative Adversarial Networks (GANs) to generate new adversarial examples for model retraining. To do so, we develop an automated pipeline using
Shayan Taheri +3 more
doaj +1 more source
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter +4 more
doaj +1 more source
Resilient Distributed Energy Management for Systems of Interconnected Microgrids [PDF]
In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply ...
Ananduta, Wicak +3 more
core +2 more sources
In this work, we propose ShallowDeepNet, a novel system architecture that includes a shallow and a deep neural network. The shallow neural network has the duty of data preprocessing and generating adversarial samples. The deep neural network has the duty
Shayan Taheri +2 more
doaj +1 more source
WordRevert: Adversarial Examples Defence Method for Chinese Text Classification
Adversarial examples can evade the detection of text classification models based on Deep Neural Networks (DNNs), thus posing a potential security threat to the system.
Enhui Xu +5 more
doaj +1 more source
Mergers, Litigation and Efficiency [PDF]
We consider antitrust enforcement within the adversarial model used by the United States. We show that, under the adversarial system, the Antitrust Authority may try to prohibit mergers also in those cases in which litigation is inefficient.
Gürtler, Oliver, Kräkel, Matthias
core +3 more sources
The Adversarial Myth: Appellate Court Extra-Record Factfinding [PDF]
The United States\u27 commitment to adversarial justice is a defining feature of its legal system. Standing doctrine, for example, is supposed to ensure that courts can rely on adverse parties to present the facts courts need to resolve disputes ...
Gorod, Brianne J.
core +3 more sources
Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj +1 more source
Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 1. [PDF]
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj

