Results 31 to 40 of about 24,885,017 (322)
Deep learning models have been used in creating various effective image classification applications. However, they are vulnerable to adversarial attacks that seek to misguide the models into predicting incorrect classes.
Mohammed Alkhowaiter +4 more
doaj +1 more source
In this work, we propose ShallowDeepNet, a novel system architecture that includes a shallow and a deep neural network. The shallow neural network has the duty of data preprocessing and generating adversarial samples. The deep neural network has the duty
Shayan Taheri +2 more
doaj +1 more source
WordRevert: Adversarial Examples Defence Method for Chinese Text Classification
Adversarial examples can evade the detection of text classification models based on Deep Neural Networks (DNNs), thus posing a potential security threat to the system.
Enhui Xu +5 more
doaj +1 more source
Mergers, Litigation and Efficiency [PDF]
We consider antitrust enforcement within the adversarial model used by the United States. We show that, under the adversarial system, the Antitrust Authority may try to prohibit mergers also in those cases in which litigation is inefficient.
Gürtler, Oliver, Kräkel, Matthias
core +3 more sources
The Adversarial Myth: Appellate Court Extra-Record Factfinding [PDF]
The United States\u27 commitment to adversarial justice is a defining feature of its legal system. Standing doctrine, for example, is supposed to ensure that courts can rely on adverse parties to present the facts courts need to resolve disputes ...
Gorod, Brianne J.
core +3 more sources
AdvHat: Real-World Adversarial Attack on ArcFace Face ID System [PDF]
In this paper we propose a novel easily reproducible technique to attack the best public Face ID system ArcFace in different shooting conditions. To create an attack, we print the rectangular paper sticker on a common color printer and put it on the hat.
Stepan Alekseevich Komkov +1 more
semanticscholar +1 more source
Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj +1 more source
Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 1. [PDF]
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj
Deep learning (DL) has exhibited its exceptional performance in fields like intrusion detection. Various augmentation methods have been proposed to improve data quality and eventually to enhance the performance of DL models.
Yixiang Wang +4 more
doaj +1 more source
Synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system: The example of the International Criminal Tribunal for the Former Yugoslavia: Part 2. [PDF]
In this paper, the author analyses criminal procedural rules created as an expression of the synthesis of the common-law accusatorial and the continental mixed criminal procedural justice system in International Tribunal for Former Yugoslavia (ICTY). The
Radulović Jovan
doaj

