Results 281 to 290 of about 22,784,147 (354)
Some of the next articles are maybe not open access.
Objectivity in an adversarial system
Medico-Legal Journal, 2020The Rt Hon Lady Justice Heather Hallet
openaire +3 more sources
Jailbreaking GPT-4V via Self-Adversarial Attacks with System Prompts
arXiv.org, 2023Existing work on jailbreak Multimodal Large Language Models (MLLMs) has focused primarily on adversarial examples in model inputs, with less attention to vulnerabilities, especially in model API. To fill the research gap, we carry out the following work:
Yuanwei Wu +4 more
semanticscholar +1 more source
IEEE Transactions on Smart Grid, 2023
The network attack detection model based on machine learning (ML) has received extensive attention and research in PMU measurement data protection of power systems. However, well-trained ML-based detection models are vulnerable to adversarial attacks. By
Rong Huang, Yuancheng Li
semanticscholar +1 more source
The network attack detection model based on machine learning (ML) has received extensive attention and research in PMU measurement data protection of power systems. However, well-trained ML-based detection models are vulnerable to adversarial attacks. By
Rong Huang, Yuancheng Li
semanticscholar +1 more source
IEEE Transactions on Control of Network Systems, 2022
Based on machine learning (ML) technique, the data-driven power system dynamic security assessment (DSA) has received significant research interest. Yet, the well-trained ML-based models with high training and testing accuracy may be vulnerable to the ...
Chao Ren, Yan Xu
semanticscholar +1 more source
Based on machine learning (ML) technique, the data-driven power system dynamic security assessment (DSA) has received significant research interest. Yet, the well-trained ML-based models with high training and testing accuracy may be vulnerable to the ...
Chao Ren, Yan Xu
semanticscholar +1 more source
IEEE Transactions on Dependable and Secure Computing, 2022
There has been an increasing interest in the use of data-driven techniques for classifying cyber-attacks and physical faults in cyber-physical systems.
Maryam Farajzadeh-Zanjani +3 more
semanticscholar +1 more source
There has been an increasing interest in the use of data-driven techniques for classifying cyber-attacks and physical faults in cyber-physical systems.
Maryam Farajzadeh-Zanjani +3 more
semanticscholar +1 more source
IEEE Transactions on Smart Grid, 2022
Based on machine learning (ML) technique, the data-driven power system stability assessment has received significant research interests in recent years.
Chao Ren +5 more
semanticscholar +1 more source
Based on machine learning (ML) technique, the data-driven power system stability assessment has received significant research interests in recent years.
Chao Ren +5 more
semanticscholar +1 more source
MANDA: On Adversarial Example Detection for Network Intrusion Detection System
IEEE Conference on Computer Communications, 2021With the rapid advancement in machine learning (ML), ML-based Intrusion Detection Systems (IDSs) are widely deployed to protect networks from various attacks.
Ning Wang +4 more
semanticscholar +1 more source
AdvDoor: adversarial backdoor attack of deep learning system
International Symposium on Software Testing and Analysis, 2021Deep Learning (DL) system has been widely used in many critical applications, such as autonomous vehicles and unmanned aerial vehicles. However, their security is threatened by backdoor attack, which is achieved by adding artificial patterns on specific ...
Quan Zhang +5 more
semanticscholar +1 more source
The Adversary System: Cui Bono?
Annals of Internal Medicine, 1982Excerpt The article by Richman in this issue(1) provides a dispassionate and objective review of compensation for industrial disease.
W. KEITH, C. MORGAN
openaire +2 more sources
Adversarial-Example Attacks Toward Android Malware Detection System
IEEE Systems Journal, 2020Recently, it was shown that the generative adversarial network (GAN) based adversarial-example attacks could thoroughly defeat the existing Android malware detection systems.
Heng Li +4 more
semanticscholar +1 more source

