Results 11 to 20 of about 24,885,017 (322)

Plaintiff aims in medical negligence disputes: limitations of an adversarial system. [PDF]

open access: yesMed Law Rev, 2023
The adversarial nature of medical negligence litigation is subject to frequent criticism by the media, patient advocates, and scholars. In Ireland, reform of the medical negligence dynamic is often mooted, particularly in response to the high financial ...
Tumelty ME.
europepmc   +2 more sources

A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System [PDF]

open access: yesComputers & security, 2023
Deep learning based intrusion detection systems (DL-based IDS) have emerged as one of the best choices for providing security solutions against various network intrusion attacks.
Xin Yuan   +5 more
semanticscholar   +1 more source

Adversarial System Variant Approximation to Quantify Process Model Generalization [PDF]

open access: yesIEEE Access, 2020
In process mining, process models are extracted from event logs using process discovery algorithms and are commonly assessed using multiple quality metrics.
J. Theis, H. Darabi
semanticscholar   +1 more source

Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack [PDF]

open access: yesIEEE International Conference on Computer Vision, 2023
In autonomous driving (AD), accurate perception is indispensable to achieving safe and secure driving. Due to its safety-criticality, the security of AD perception has been widely studied.
Ningfei Wang   +4 more
semanticscholar   +1 more source

Physically constrained generative adversarial networks for improving precipitation fields from Earth system models [PDF]

open access: yesNature Machine Intelligence, 2022
Precipitation results from complex processes across many scales, making its accurate simulation in Earth system models (ESMs) challenging. Existing post-processing methods can improve ESM simulations locally but cannot correct errors in modelled spatial ...
P. Hess   +4 more
semanticscholar   +1 more source

An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks

open access: yesIEEE Internet of Things Journal, 2023
As communication technology advances, various and heterogeneous data are communicated in distributed environments through network systems. Meanwhile, along with the development of communication technology, the attack surface has expanded, and concerns ...
Cheolhee Park   +5 more
semanticscholar   +1 more source

Image-to-Image Translation with Conditional Adversarial Networks [PDF]

open access: yesComputer Vision and Pattern Recognition, 2016
We investigate conditional adversarial networks as a general-purpose solution to image-to-image translation problems. These networks not only learn the mapping from input image to output image, but also learn a loss function to train this mapping.
Phillip Isola   +3 more
semanticscholar   +1 more source

Attack on Practical Speaker Verification System Using Universal Adversarial Perturbations [PDF]

open access: yesIEEE International Conference on Acoustics, Speech, and Signal Processing, 2021
In authentication scenarios, applications of practical speaker verification systems usually require a person to read a dynamic authentication text. Previous studies played an audio adversarial example as a digital signal to perform physical attacks ...
Weiyi Zhang   +6 more
semanticscholar   +1 more source

Subsidiary Prosecution in Adversarial System

open access: yesIzvestiya of Altai State University, 2017
Рассматривается осуществление потерпевшим функции уголовного преследования в контексте обеспечения состязательных начал в уголовном судопроизводстве.
G. N. Vetrova
openaire   +3 more sources

Adversarial Attacks on Large Language Model-Based System and Mitigating Strategies: A Case Study on ChatGPT

open access: yesSecurity and Communication Networks, 2023
Machine learning algorithms are at the forefront of the development of advanced information systems. The rapid progress in machine learning technology has enabled cutting-edge large language models (LLMs), represented by GPT-3 and ChatGPT, to perform a ...
Bowen Liu   +5 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy