Adversarial Systems and Adversarial Mindsets: Do We Need Either? [PDF]
extract] The styles of teaching and studying law in civilian and common law jurisdictions are very different. In the context of a desire to make civil procedure in common law jurisdictions less adversarial, the greater emphasis on case based learning in the common law world is striking.
openaire +3 more sources
Physical Layer Communications System Design Over-the-Air Using Adversarial Networks [PDF]
This paper presents a novel method for synthesizing new physical layer modulation and coding schemes for communications systems using a learning-based approach which does not require an analytic model of the impairments in the channel.
Tim O'Shea +3 more
semanticscholar +1 more source
On Adversarial Patches: Real-World Attack on ArcFace-100 Face Recognition System [PDF]
Recent works showed the vulnerability of image classifiers to adversarial attacks in the digital domain. However, the majority of attacks involve adding small perturbation to an image to fool the classifier. Unfortunately, such procedures can not be used
Mikhail Aleksandrovich Pautov +4 more
semanticscholar +1 more source
Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning
The ever-evolving cybersecurity environment has given rise to sophisticated adversaries who constantly explore new ways to attack cyberinfrastructure. Recently, the use of deep learning-based intrusion detection systems has been on the rise. This rise is
Kudzai Sauka +3 more
doaj +1 more source
Adversarial Training Towards Robust Multimedia Recommender System [PDF]
With the prevalence of multimedia content on the Web, developing recommender solutions that can effectively leverage the rich signal in multimedia data is in urgent need.
Jinhui Tang +5 more
semanticscholar +1 more source
Active Learning‐Guided Accelerated Discovery of Ultra‐Efficient High‐Entropy Thermoelectrics
An active learning framework is introduced for the accelerated discovery of high‐entropy chalcogenides with superior thermoelectric performance. Only 80 targeted syntheses, selected from 16206 possible combinations, led to three high‐performance compositions, demonstrating the remarkable efficiency of data‐driven guidance in experimental materials ...
Hanhwi Jang +8 more
wiley +1 more source
Study of Pre-processing Defenses against Adversarial Attacks on\n State-of-the-art Speaker Recognition Systems [PDF]
Sonal Joshi +4 more
openalex +2 more sources
Mitigation of Black-Box Attacks on Intrusion Detection Systems-Based ML
Intrusion detection systems (IDS) are a very vital part of network security, as they can be used to protect the network from illegal intrusions and communications.
Shahad Alahmed +4 more
doaj +1 more source
Organic Electrochemical Transistors for Neuromorphic Devices and Applications
Organic electrochemical transistors are emerging as promising platforms for neuromorphic devices that emulate neuronal and synaptic activities and can seamlessly integrate with biological systems. This review focuses on resultant organic artificial neurons, synapses, and integrated devices, with an emphasis on their ability to perform neuromorphic ...
Kexin Xiang +4 more
wiley +1 more source
Materials and System Design for Self‐Decision Bioelectronic Systems
This review highlights how self‐decision bioelectronic systems integrate sensing, computation, and therapy into autonomous, closed‐loop platforms that continuously monitor and treat diseases, marking a major step toward intelligent, self‐regulating healthcare technologies.
Qiankun Zeng +9 more
wiley +1 more source

