Results 1 to 10 of about 2,527,664 (140)
Anthropomorphic greenhouse gases are raising the temperature of the earth and threatening ecosystems. Since 1950 atmospheric carbon dioxide has increased 28%, while methane has increased 70%.
John L. Black +2 more
doaj +1 more source
Besting the Black-Box: Barrier Zones for Adversarial Example Defense
Adversarial machine learning defenses have primarily been focused on mitigating static, white-box attacks. However, it remains an open question whether such defenses are robust under an adaptive black-box adversary.
Kaleel Mahmood +4 more
doaj +1 more source
An Empirical Comparison of Interpretable Models to Post-Hoc Explanations
Recently, some effort went into explaining intransparent and black-box models, such as deep neural networks or random forests. So-called model-agnostic methods typically approximate the prediction of the intransparent black-box model with an ...
Parisa Mahya, Johannes Fürnkranz
doaj +1 more source
A Case Study on the Design Requirements of Airborne Black Box considering the Extreme Environment [PDF]
An airborne black box should preserve the recorded data under the extreme environmental conditions such an aircraft crash. Through the recorded information from the black box, the cause of the aircraft crash can be analyzed.
Jung Pil Kim +3 more
doaj +1 more source
Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples
Many defenses have recently been proposed at venues like NIPS, ICML, ICLR and CVPR. These defenses are mainly focused on mitigating white-box attacks. They do not properly examine black-box attacks.
Kaleel Mahmood +3 more
doaj +1 more source
Black Box Adversarial Attack Starting Point Promotion Method Based on Mobility Between Models [PDF]
In order to efficiently find the adversarial samples under the decision-based black box attacks, a method using the mobility between models is proposed to enhance the adversarial starting point. The mobility is used to circularly superimpose interference
CHEN Xiaonan, HU Jianmin, ZHANG Benjun, CHEN Ailing
doaj +1 more source
ABSTRAK Penelitian ini bertujuan untuk mengetahui hasil dari penerepan evaluasi model black box yang mengggunakan media audio-visual dalam penyampaian materinya ketika diterapkan pada evaluasi ketrampilan menyimak.
Nesa Ramadanti, Aninditya Sri Nugrahaeni
doaj +1 more source
Universal adversarial attacks, which hinder most deep neural network (DNN) tasks using only a single perturbation called universal adversarial perturbation (UAP), are a realistic security threat to the practical application of a DNN for medical imaging ...
Kazuki Koga, Kazuhiro Takemoto
doaj +1 more source
Separating Two-Round Secure Computation From Oblivious Transfer [PDF]
We consider the question of minimizing the round complexity of protocols for secure multiparty computation (MPC) with security against an arbitrary number of semi-honest parties. Very recently, Garg and Srinivasan (Eurocrypt 2018) and Benhamouda and Lin (
Applebaum, Benny +4 more
core +2 more sources
Cambridge Analytica’s black box
The Cambridge Analytica–Facebook scandal led to widespread concern over the methods deployed by Cambridge Analytica to target voters through psychographic profiling algorithms, built upon Facebook user data.
Margaret Hu
doaj +1 more source

