Results 281 to 290 of about 1,240,940 (339)
Some of the next articles are maybe not open access.

BockNet: Blind-Block Reconstruction Network With a Guard Window for Hyperspectral Anomaly Detection

IEEE Transactions on Geoscience and Remote Sensing, 2023
Hyperspectral anomaly detection (HAD) aims to identify anomalous targets that deviate from the surrounding background in unlabeled hyperspectral images (HSIs).
Degang Wang, Lina Zhuang, Lianru Gao
exaly   +2 more sources

Llama Guard: LLM-based Input-Output Safeguard for Human-AI Conversations

arXiv.org, 2023
We introduce Llama Guard, an LLM-based input-output safeguard model geared towards Human-AI conversation use cases. Our model incorporates a safety risk taxonomy, a valuable tool for categorizing a specific set of safety risks found in LLM prompts (i.e.,
Hakan Inan   +10 more
semanticscholar   +1 more source

“Who Guards the Guards?”

International Journal of Human Capital and Information Technology Professionals, 2021
The studies about panopticism have a highlighted spot on organizational researches. Recently, with the inclusion of information technology, it creates the digital panopticon, in which informational systems perform the control, including on the vigilantes themselves (managers).
Henrique Bertosso, Jandir Pauli
openaire   +1 more source

Metabolism within the specialized guard cells of plants

open access: yesNew Phytologist, 2017
David B Medeiros   +2 more
exaly   +2 more sources

WHO GUARDS THE GUARDS?

African Security Review, 2004
In recent years there have been growing reports of UN peacekeepers committing severe crimes against the people they are meant to protect, while on peacekeeping duties. These crimes often take the form of gender-based violence and abuse. This paper examines the nature and extent of the problem, the accountability of the peacekeeping troops, the role and
MAX DU PLESSIS, STEPHEN PETE
openaire   +1 more source

Malware Guard Extension: Using SGX to Conceal Cache Attacks

International Conference on Detection of intrusions and malware, and vulnerability assessment, 2017
In modern computer systems, user processes are isolated from each other by the operating system and the hardware. Additionally, in a cloud scenario it is crucial that the hypervisor isolates tenants from other tenants that are co-located on the same ...
Michael Schwarz   +4 more
semanticscholar   +1 more source

Evolution of Guard-Cell Theories: The Story of Sugars

Trends in Plant Science, 2019
Stomata are dynamic pores in the impermeable cuticle that coats the aerial parts of vascular plants, allowing the entry of CO2 for photosynthesis and controlling water loss. They are composed of two guard cells that can swell or shrink due to an increase
David Granot, Gilor Kelly
exaly   +2 more sources

Roles of sucrose in guard cell regulation

open access: yesNew Phytologist, 2016
Alisdair R Fernie, Letícia dos Anjos
exaly   +2 more sources

Llama Guard 3 Vision: Safeguarding Human-AI Image Understanding Conversations

arXiv.org
We introduce Llama Guard 3 Vision, a multimodal LLM-based safeguard for human-AI conversations that involves image understanding: it can be used to safeguard content for both multimodal LLM inputs (prompt classification) and outputs (response ...
Jianfeng Chi   +9 more
semanticscholar   +1 more source

PRP: Propagating Universal Perturbations to Attack Large Language Model Guard-Rails

Annual Meeting of the Association for Computational Linguistics
Large language models (LLMs) are typically aligned to be harmless to humans. Unfortunately, recent work has shown that such models are susceptible to automated jailbreak attacks that induce them to generate harmful content.
Neal Mangaokar   +6 more
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy