Results 241 to 250 of about 24,885,017 (322)
Energy-Efficient and Adversarially Resilient Underwater Object Detection via Adaptive Vision Transformers. [PDF]
Li L, Zhang G, Zhou Y.
europepmc +1 more source
Secure and fault tolerant cloud based framework for medical image storage and retrieval in a distributed environment. [PDF]
Amaithi Rajan A, V V, M A, R PK.
europepmc +1 more source
ASQ-PHI: An adversarial synthetic data benchmark for clinical de-identification and search utility. [PDF]
Weatherhead J, Golovko G, McCaffrey P.
europepmc +1 more source
OntoSecAI: Ontology-driven security automation for AI-enabled systems. [PDF]
Ullah U, Haleem M, Ullah A.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Objectivity in an adversarial system
Medico-Legal Journal, 2020The Rt Hon Lady Justice Heather Hallet
openaire +3 more sources
Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts
arXiv.org, 2023Existing work on jailbreak Multimodal Large Language Models (MLLMs) has focused primarily on adversarial examples in model inputs, with less attention to vulnerabilities, especially in model API. To fill the research gap, we carry out the following work:
Yuanwei Wu +4 more
semanticscholar +1 more source
IEEE Transactions on Smart Grid, 2023
The network attack detection model based on machine learning (ML) has received extensive attention and research in PMU measurement data protection of power systems. However, well-trained ML-based detection models are vulnerable to adversarial attacks. By
Rong Huang, Yuancheng Li
semanticscholar +1 more source
The network attack detection model based on machine learning (ML) has received extensive attention and research in PMU measurement data protection of power systems. However, well-trained ML-based detection models are vulnerable to adversarial attacks. By
Rong Huang, Yuancheng Li
semanticscholar +1 more source

