Results 71 to 80 of about 36,777 (311)
Imperceptible Face Forgery Attack via Adversarial Semantic Mask [PDF]
With the great development of generative model techniques, face forgery detection draws more and more attention in the related field. Researchers find that existing face forgery models are still vulnerable to adversarial examples with generated pixel perturbations in the global image. These generated adversarial samples still can't achieve satisfactory
Decheng Liu +4 more
openalex +3 more sources
Multimodal large language models (MLLMs) have demonstrated strong capabilities in vision-related tasks, capitalizing on their visual semantic comprehension and reasoning capabilities.
Yichen Shi +9 more
doaj +1 more source
A Statistical Approach for Keystroke Continuous Authentication Subversion
Continuous Authentication systems leveraging keystroke dynamics are increasingly used to verify users unobtrusively. However, the resilience of these systems against advanced adversarial techniques remains unclear.
Danny Radosevich, Mike Borowczak
doaj +1 more source
NORX is an authenticated encryption scheme with associated data being publicly scrutinized as part of the ongoing CAESAR competition, where 14 other primitives are also competing.
Colin Chaigneau +4 more
doaj +1 more source
Analysis of Adversarial Attacks against CNN-based Image Forgery Detectors [PDF]
With the ubiquitous diffusion of social networks, images are becoming a dominant and powerful communication channel. Not surprisingly, they are also increasingly subject to manipulations aimed at distorting information and spreading fake news. In recent years, the scientific community has devoted major efforts to contrast this menace, and many image ...
Diego Gragnaniello +3 more
openaire +3 more sources
Psychoactive prescription drug use and misuse in patients on opioid agonist treatment
Aims To identify the patterns and trends in prescription drug use and misuse in patients on opioid agonist treatment. Methods We used data from the OPPIDUM programme, which collects data from patients attending substance abuse treatment facilities. Data collected include use of psychoactive prescription drugs in the past week.
Thomas Soeiro +5 more
wiley +1 more source
‘Let's talk about the weather’: The activist curriculum and global climate change education
Abstract Activist movements have garnered significant global attention on a range of sustainability issues, often involving collectives of citizens coming together. Invoked is the idea of citizens informed to act, emerging not from a common‐sense understanding of everyday life, but rather from a deep political understanding of the world—one that is ...
Richard Pountney
wiley +1 more source
‘Where are the adults?’: Troubling child‐activism and children's political participation
Abstract Children's political participation is a well‐established theme in childhood studies. In this article we offer an original account of child activism that takes into account the entangled and emergent aspect of children as activists. We begin with a historical and a conceptual review, noting the importance of mid‐20th century developments such ...
Sharon Hunter, Claire Cassidy
wiley +1 more source
From paradise lost to paradise regained: A compassionate retuning of assessed seminars
Abstract Universities often aim to deliver a curriculum that is both research‐based and develops transferable skills in students, thereby enhancing their competitiveness in the job market. At the same time, evidence indicates that university students experience significant stress owing to the competitive nature of the assessments, an aspect that is ...
Sarah Stephen
wiley +1 more source
Camera-based Image Forgery Localization using Convolutional Neural Networks
Camera fingerprints are precious tools for a number of image forensics tasks. A well-known example is the photo response non-uniformity (PRNU) noise pattern, a powerful device fingerprint.
Cozzolino, Davide, Verdoliva, Luisa
core +1 more source

