Results 31 to 40 of about 22,784,147 (354)

WordRevert: Adversarial Examples Defence Method for Chinese Text Classification

open access: yesIEEE Access, 2022
Adversarial examples can evade the detection of text classification models based on Deep Neural Networks (DNNs), thus posing a potential security threat to the system.
Enhui Xu   +5 more
doaj   +1 more source

Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network

open access: yesRemote Sensing, 2021
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj   +1 more source

Defending Against Adversarial Attacks On Medical Imaging Ai System, Classification Or Detection? [PDF]

open access: yesIEEE International Symposium on Biomedical Imaging, 2020
Medical imaging AI systems such as disease classification and segmentation are increasingly inspired and transformed from computer vision based AI systems. Although an array of defense techniques have been developed and proved to be effective in computer
X. Li, Deng Pan, D. Zhu
semanticscholar   +1 more source

Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 1. [PDF]

open access: yesPravni Zapisi, 2014
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj  

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning

open access: yesIEEE Transactions on Emerging Topics in Computational Intelligence, 2020
Machine Learning (ML) algorithms, specifically supervised learning, are widely used in modern real-world applications, which utilize Computational Intelligence (CI) as their core technology, such as autonomous vehicles, assistive robots, and biometric ...
Koosha Sadeghi   +2 more
semanticscholar   +1 more source

Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 2. [PDF]

open access: yesPravni Zapisi, 2014
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj  

GANG-MAM: GAN based enGine for Modifying Android Malware

open access: yesSoftwareX, 2022
Malware detectors based on machine learning are vulnerable to adversarial attacks. Generative Adversarial Networks (GAN) are architectures based on Neural Networks that may be used to produce successful adversarial samples.
Renjith G.   +4 more
doaj   +1 more source

Exploring Diverse Feature Extractions for Adversarial Audio Detection

open access: yesIEEE Access, 2023
Although deep learning models have exhibited excellent performance in various domains, recent studies have discovered that they are highly vulnerable to adversarial attacks.
Yujin Choi   +3 more
doaj   +1 more source

Improving Deceptive Patch Solutions Using Novel Deep Learning-Based Time Analysis Model for Industrial Control Systems

open access: yesApplied Sciences
Industrial control systems (ICSs) are critical components automating the processes and operations of electromechanical systems. These systems are vulnerable to cyberattacks and can be the targets of malicious activities.
Hayriye Tanyıldız   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy