Results 21 to 30 of about 240,849 (326)

An American Advantage? How American and Swiss Criminal Defense Attorneys Evaluate Forensic DNA Evidence [PDF]

open access: yes, 2016
Critics of the American system of justice sometimes perceive “inquisitorialism” as an attractive alternative. In this article we will report a comparative study investigating the way forensic DNA evidence is handled in criminal prosecutions in the Swiss ...
Thompson, William C, Vuille, Joelle
core   +1 more source

Mergers, Litigation and Efficiency [PDF]

open access: yes, 2006
We consider antitrust enforcement within the adversarial model used by the United States. We show that, under the adversarial system, the Antitrust Authority may try to prohibit mergers also in those cases in which litigation is inefficient.
Gürtler, Oliver, Kräkel, Matthias
core   +3 more sources

Adversarial Attacks on ASR Systems: An Overview

open access: yesCoRR, 2022
With the development of hardware and algorithms, ASR(Automatic Speech Recognition) systems evolve a lot. As The models get simpler, the difficulty of development and deployment become easier, ASR systems are getting closer to our life. On the one hand, we often use APPs or APIs of ASR to generate subtitles and record meetings.
Xiao Zhang   +5 more
openaire   +2 more sources

Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network

open access: yesRemote Sensing, 2021
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj   +1 more source

Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 1. [PDF]

open access: yesPravni Zapisi, 2014
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj  

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 2. [PDF]

open access: yesPravni Zapisi, 2014
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj  

Adversarial attacks on Copyright Detection Systems

open access: yesCoRR, 2019
It is well-known that many machine learning models are susceptible to adversarial attacks, in which an attacker evades a classifier by making small perturbations to inputs. This paper discusses how industrial copyright detection tools, which serve a central role on the web, are susceptible to adversarial attacks.
Parsa Saadatpanah   +2 more
openaire   +3 more sources

Improving Deceptive Patch Solutions Using Novel Deep Learning-Based Time Analysis Model for Industrial Control Systems

open access: yesApplied Sciences
Industrial control systems (ICSs) are critical components automating the processes and operations of electromechanical systems. These systems are vulnerable to cyberattacks and can be the targets of malicious activities.
Hayriye Tanyıldız   +2 more
doaj   +1 more source

GANG-MAM: GAN based enGine for Modifying Android Malware

open access: yesSoftwareX, 2022
Malware detectors based on machine learning are vulnerable to adversarial attacks. Generative Adversarial Networks (GAN) are architectures based on Neural Networks that may be used to produce successful adversarial samples.
Renjith G.   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy