Results 31 to 40 of about 240,849 (326)

The Adversarial Myth: Appellate Court Extra-Record Factfinding [PDF]

open access: yes, 2011
The United States\u27 commitment to adversarial justice is a defining feature of its legal system. Standing doctrine, for example, is supposed to ensure that courts can rely on adverse parties to present the facts courts need to resolve disputes ...
Gorod, Brianne J.
core   +3 more sources

Exploring Diverse Feature Extractions for Adversarial Audio Detection

open access: yesIEEE Access, 2023
Although deep learning models have exhibited excellent performance in various domains, recent studies have discovered that they are highly vulnerable to adversarial attacks.
Yujin Choi   +3 more
doaj   +1 more source

Adversarial Learning for Neural Dialogue Generation

open access: yes, 2017
In this paper, drawing intuition from the Turing test, we propose using adversarial training for open-domain dialogue generation: the system is trained to produce sequences that are indistinguishable from human-generated dialogue utterances.
Jean, Sébastien   +5 more
core   +1 more source

Study of Pre-processing Defenses against Adversarial Attacks on\n State-of-the-art Speaker Recognition Systems [PDF]

open access: green, 2021
Sonal Joshi   +4 more
openalex   +2 more sources

Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks

open access: yes, 2018
This work shows that it is possible to fool/attack recent state-of-the-art face detectors which are based on the single-stage networks. Successfully attacking face detectors could be a serious malware vulnerability when deploying a smart surveillance ...
D Chen   +5 more
core   +1 more source

Physical Adversarial Attacks Against End-to-End Autoencoder Communication Systems

open access: yes, 2019
We show that end-to-end learning of communication systems through deep neural network (DNN) autoencoders can be extremely vulnerable to physical adversarial attacks.
Larsson, Erik G., Sadeghi, Meysam
core   +1 more source

Representation of White- and Black-Box Adversarial Examples in Deep Neural Networks and Humans: A Functional Magnetic Resonance Imaging Study

open access: yes, 2019
The recent success of brain-inspired deep neural networks (DNNs) in solving complex, high-level visual tasks has led to rising expectations for their potential to match the human visual system.
Han, Chihye   +4 more
core   +1 more source

Meniscus Pixel Printing for Contact‐Lens Vision Sensing and Robotic Control

open access: yesAdvanced Functional Materials, EarlyView.
A visual‐sensing contact lens is enabled by meniscus pixel printing (MPP), which rapidly patterns a 200 µm perovskite photodetector pixel in 1 s without masks, vacuum processing, or bulky equipment. A deep‐learning‐based super‐resolution reconstructs sparse on‐lens signals into 80 × 80 high‐resolution visual information, while AI‐driven eye‐tracking ...
Byung‐Hoon Gong   +7 more
wiley   +1 more source

Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning

open access: yesApplied Sciences, 2022
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constantly explore new ways to attack cyberinfrastructure. Recently, the use of deep learning-based intrusion detection systems has been on the rise. This rise is
Kudzai Sauka   +3 more
doaj   +1 more source

Self‐Assembled Monolayers in p–i–n Perovskite Solar Cells: Molecular Design, Interfacial Engineering, and Machine Learning–Accelerated Material Discovery

open access: yesAdvanced Materials, EarlyView.
This review highlights the role of self‐assembled monolayers (SAMs) in perovskite solar cells, covering molecular engineering, multifunctional interface regulation, machine learning (ML) accelerated discovery, advanced device architectures, and pathways toward scalable fabrication and commercialization for high‐efficiency and stable single‐junction and
Asmat Ullah, Ying Luo, Stefaan De Wolf
wiley   +1 more source

Home - About - Disclaimer - Privacy