Results 31 to 40 of about 24,885,017 (322)

Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach

open access: yesSensors, 2023
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter   +4 more
doaj   +1 more source

RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network

open access: yesBig Data and Cognitive Computing, 2019
In this work, we propose ShallowDeepNet, a novel system architecture that includes a shallow and a deep neural network. The shallow neural network has the duty of data preprocessing and generating adversarial samples. The deep neural network has the duty
Shayan Taheri   +2 more
doaj   +1 more source

WordRevert: Adversarial Examples Defence Method for Chinese Text Classification

open access: yesIEEE Access, 2022
Adversarial examples can evade the detection of text classification models based on Deep Neural Networks (DNNs), thus posing a potential security threat to the system.
Enhui Xu   +5 more
doaj   +1 more source

Mergers, Litigation and Efficiency [PDF]

open access: yes, 2006
We consider antitrust enforcement within the adversarial model used by the United States. We show that, under the adversarial system, the Antitrust Authority may try to prohibit mergers also in those cases in which litigation is inefficient.
Gürtler, Oliver, Kräkel, Matthias
core   +3 more sources

The Adversarial Myth: Appellate Court Extra-Record Factfinding [PDF]

open access: yes, 2011
The United States\u27 commitment to adversarial justice is a defining feature of its legal system. Standing doctrine, for example, is supposed to ensure that courts can rely on adverse parties to present the facts courts need to resolve disputes ...
Gorod, Brianne J.
core   +3 more sources

AdvHat: Real-World Adversarial Attack on ArcFace Face ID System [PDF]

open access: yesInternational Conference on Pattern Recognition, 2019
In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat.
Stepan Alekseevich Komkov   +1 more
semanticscholar   +1 more source

Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network

open access: yesRemote Sensing, 2021
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj   +1 more source

Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 1. [PDF]

open access: yesPravni Zapisi, 2014
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj  

On the combination of data augmentation method and gated convolution model for building effective and robust intrusion detection

open access: yesCybersecurity, 2020
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang   +4 more
doaj   +1 more source

Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 2. [PDF]

open access: yesPravni Zapisi, 2014
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj  

Home - About - Disclaimer - Privacy