Plaintiff aims in medical negligence disputes: limitations of an adversarial system. [PDF]
The adversarial nature of medical negligence litigation is subject to frequent criticism by the media, patient advocates, and scholars. In Ireland, reform of the medical negligence dynamic is often mooted, particularly in response to the high financial ...
Tumelty ME.
europepmc +2 more sources
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System [PDF]
Deep learning based intrusion detection systems (DL-based IDS) have emerged as one of the best choices for providing security solutions against various network intrusion attacks.
Xin Yuan +5 more
semanticscholar +1 more source
Adversarial System Variant Approximation to Quantify Process Model Generalization [PDF]
In process mining, process models are extracted from event logs using process discovery algorithms and are commonly assessed using multiple quality metrics.
J. Theis, H. Darabi
semanticscholar +1 more source
Does Physical Adversarial Example Really Matter to Autonomous Driving? Towards System-Level Effect of Adversarial Object Evasion Attack [PDF]
In autonomous driving (AD), accurate perception is indispensable to achieving safe and secure driving. Due to its safety-criticality, the security of AD perception has been widely studied.
Ningfei Wang +4 more
semanticscholar +1 more source
Physically constrained generative adversarial networks for improving precipitation fields from Earth system models [PDF]
Precipitation results from complex processes across many scales, making its accurate simulation in Earth system models (ESMs) challenging. Existing post-processing methods can improve ESM simulations locally but cannot correct errors in modelled spatial ...
P. Hess +4 more
semanticscholar +1 more source
An Enhanced AI-Based Network Intrusion Detection System Using Generative Adversarial Networks
As communication technology advances, various and heterogeneous data are communicated in distributed environments through network systems. Meanwhile, along with the development of communication technology, the attack surface has expanded, and concerns ...
Cheolhee Park +5 more
semanticscholar +1 more source
Image-to-Image Translation with Conditional Adversarial Networks [PDF]
We investigate conditional adversarial networks as a general-purpose solution to image-to-image translation problems. These networks not only learn the mapping from input image to output image, but also learn a loss function to train this mapping.
Phillip Isola +3 more
semanticscholar +1 more source
Attack on Practical Speaker Verification System Using Universal Adversarial Perturbations [PDF]
In authentication scenarios, applications of practical speaker verification systems usually require a person to read a dynamic authentication text. Previous studies played an audio adversarial example as a digital signal to perform physical attacks ...
Weiyi Zhang +6 more
semanticscholar +1 more source
Subsidiary Prosecution in Adversarial System
Рассматривается осуществление потерпевшим функции уголовного преследования в контексте обеспечения состязательных начал в уголовном судопроизводстве.
G. N. Vetrova
openaire +3 more sources
Machine learning algorithms are at the forefront of the development of advanced information systems. The rapid progress in machine learning technology has enabled cutting-edge large language models (LLMs), represented by GPT-3 and ChatGPT, to perform a ...
Bowen Liu +5 more
semanticscholar +1 more source

