Results 11 to 20 of about 240,849 (326)
Deep learning technology has developed rapidly in recent years and has been successfully applied in many fields, including face recognition. Face recognition is used in many scenarios nowadays, including security control systems, access control ...
Ren-Hung Hwang +4 more
doaj +1 more source
Black-Box Audio Adversarial Attack Using Particle Swarm Optimization
The development of artificial neural networks and artificial intelligence has helped to address problems and improve services in various fields, such as autonomous driving, image classification, medical diagnosis, and speech recognition.
Hyunjun Mun +3 more
doaj +1 more source
There exist various attack strategies in continuous-variable quantum key distribution (CVQKD) system in practice. Due to the powerful information processing ability of neural networks, they are applied to the detection and classification of attack ...
Shimiao Li +5 more
doaj +1 more source
GANBA: Generative Adversarial Network for Biometric Anti-Spoofing
Automatic speaker verification (ASV) is a voice biometric technology whose security might be compromised by spoofing attacks. To increase the robustness against spoofing attacks, presentation attack detection (PAD) or anti-spoofing systems for detecting ...
Alejandro Gomez-Alanis +2 more
doaj +1 more source
DroidEnemy: Battling adversarial example attacks for Android malware detection
In recent years, we have witnessed a surge in mobile devices such as smartphones, tablets, smart watches, etc., most of which are based on the Android operating system. However, because these Android-based mobile devices are becoming increasingly popular,
Neha Bala +5 more
doaj +1 more source
Does the Adversarial System Truly Deliver Justice in South Africa? A Critical Analysis [PDF]
A pillar of South Africa’s legal system, the adversarial system places a strong emphasis on party-driven litigation in which competing parties argue their positions before an impartial judge.
Ntsika Qakaza
doaj +1 more source
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter +4 more
doaj +1 more source
In this work, we propose ShallowDeepNet, a novel system architecture that includes a shallow and a deep neural network. The shallow neural network has the duty of data preprocessing and generating adversarial samples. The deep neural network has the duty
Shayan Taheri +2 more
doaj +1 more source
WordRevert: Adversarial Examples Defence Method for Chinese Text Classification
Adversarial examples can evade the detection of text classification models based on Deep Neural Networks (DNNs), thus posing a potential security threat to the system.
Enhui Xu +5 more
doaj +1 more source
Resilient Distributed Energy Management for Systems of Interconnected Microgrids [PDF]
In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply ...
Ananduta, Wicak +3 more
core +2 more sources

