Results 11 to 20 of about 22,784,147 (354)
Double adversarial attack against license plate recognition system
Recent studies have revealed that deep neural networks (DNN) used in artificial intelligence systems are highly vulnerable to adversarial sample-based attacks.To address this issue, a dual adversarial attack method was proposed for license plate ...
Xianyi CHEN, Jun GU1, Kai YAN, Dong JIANG, Linfeng XU, Zhangjie FU
doaj +3 more sources
Image-to-Image Translation with Conditional Adversarial Networks [PDF]
We investigate conditional adversarial networks as a general-purpose solution to image-to-image translation problems. These networks not only learn the mapping from input image to output image, but also learn a loss function to train this mapping.
Phillip Isola +3 more
semanticscholar +1 more source
Adversarial attacks and defenses in deep learning
The adversarial example is a modified image that is added imperceptible perturbations, which can make deep neural networks decide wrongly. The adversarial examples seriously threaten the availability of the system and bring great security risks to the ...
LIU Ximeng +2 more
doaj +3 more sources
Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control ...
Ren-Hung Hwang +4 more
doaj +1 more source
THE ADVERSARIAL SYSTEM AND THE BEST INTERESTS OF THE CHILD IN DIVORCE LITIGATION: SOME THOUGHTS REGARDING COLLABORATIVE LAW AS A MEANS TO RESOLVE PARENTAL DISPUTES [PDF]
In this contribution it is argued that the adversarial system of litigation does not serve the best interests of children upon divorce. After a brief analysis of the system it is concluded that other less aggressive means of litigation should be ...
JA Robinson
doaj +1 more source
Machine learning algorithms are at the forefront of the development of advanced information systems. The rapid progress in machine learning technology has enabled cutting-edge large language models (LLMs), represented by GPT-3 and ChatGPT, to perform a ...
Bowen Liu +5 more
semanticscholar +1 more source
The face mask detection system has been a valuable tool to combat COVID-19 by preventing its rapid transmission. This article demonstrated that the present deep learning-based face mask detection systems are vulnerable to adversarial attacks. We proposed
Burhan ul haque Sheikh, Aasim Zafar
semanticscholar +1 more source
The advancement of Internet of Things (IoT) technologies leads to a wide penetration and large-scale deployment of IoT systems across an entire city or even country.
Xiaokang Zhou +5 more
semanticscholar +1 more source
Target-aware Dual Adversarial Learning and a Multi-scenario Multi-Modality Benchmark to Fuse Infrared and Visible for Object Detection [PDF]
This study addresses the issue of fusing infrared and visible images that appear differently for object detection. Aiming at generating an image of high visual quality, previous approaches discover commons underlying the two modalities and fuse upon the ...
Jinyuan Liu +6 more
semanticscholar +1 more source
RAILS: A Robust Adversarial Immune-Inspired Learning System
Adversarial attacks against deep neural networks (DNNs) are continuously evolving, requiring increasingly powerful defense strategies. We develop a novel adversarial defense framework inspired by the adaptive immune system: the Robust Adversarial Immune ...
Ren Wang +6 more
doaj +1 more source

