An American Advantage? How American and Swiss Criminal Defense Attorneys Evaluate Forensic DNA Evidence [PDF]
Critics of the American system of justice sometimes perceive “inquisitorialism” as an attractive alternative. In this article we will report a comparative study investigating the way forensic DNA evidence is handled in criminal prosecutions in the Swiss ...
Thompson, William C, Vuille, Joelle
core +1 more source
Mergers, Litigation and Efficiency [PDF]
We consider antitrust enforcement within the adversarial model used by the United States. We show that, under the adversarial system, the Antitrust Authority may try to prohibit mergers also in those cases in which litigation is inefficient.
Gürtler, Oliver, Kräkel, Matthias
core +3 more sources
Adversarial Attacks on ASR Systems: An Overview
With the development of hardware and algorithms, ASR(Automatic Speech Recognition) systems evolve a lot. As The models get simpler, the difficulty of development and deployment become easier, ASR systems are getting closer to our life. On the one hand, we often use APPs or APIs of ASR to generate subtitles and record meetings.
Xiao Zhang +5 more
openaire +2 more sources
Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj +1 more source
Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 1. [PDF]
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source
Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 2. [PDF]
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj
Adversarial attacks on Copyright Detection Systems
It is well-known that many machine learning models are susceptible to adversarial attacks, in which an attacker evades a classifier by making small perturbations to inputs. This paper discusses how industrial copyright detection tools, which serve a central role on the web, are susceptible to adversarial attacks.
Parsa Saadatpanah +2 more
openaire +3 more sources
Industrial control systems (ICSs) are critical components automating the processes and operations of electromechanical systems. These systems are vulnerable to cyberattacks and can be the targets of malicious activities.
Hayriye Tanyıldız +2 more
doaj +1 more source
GANG-MAM: GAN based enGine for Modifying Android Malware
Malware detectors based on machine learning are vulnerable to adversarial attacks. Generative Adversarial Networks (GAN) are architectures based on Neural Networks that may be used to produce successful adversarial samples.
Renjith G. +4 more
doaj +1 more source

