Literatura académica sobre el tema "Adversarial Defence"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte las listas temáticas de artículos, libros, tesis, actas de conferencias y otras fuentes académicas sobre el tema "Adversarial Defence".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Artículos de revistas sobre el tema "Adversarial Defence"
Jiang, Guoteng, Zhuang Qian, Qiu-Feng Wang, Yan Wei y Kaizhu Huang. "Adversarial Attack and Defence on Handwritten Chinese Character Recognition". Journal of Physics: Conference Series 2278, n.º 1 (1 de mayo de 2022): 012023. http://dx.doi.org/10.1088/1742-6596/2278/1/012023.
Texto completoHuang, Bo, Zhiwei Ke, Yi Wang, Wei Wang, Linlin Shen y Feng Liu. "Adversarial Defence by Diversified Simultaneous Training of Deep Ensembles". Proceedings of the AAAI Conference on Artificial Intelligence 35, n.º 9 (18 de mayo de 2021): 7823–31. http://dx.doi.org/10.1609/aaai.v35i9.16955.
Texto completoPawlicki, Marek y Ryszard S. Choraś. "Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks". Entropy 23, n.º 10 (3 de octubre de 2021): 1304. http://dx.doi.org/10.3390/e23101304.
Texto completoLal, Sheeba, Saeed Ur Rehman, Jamal Hussain Shah, Talha Meraj, Hafiz Tayyab Rauf, Robertas Damaševičius, Mazin Abed Mohammed y Karrar Hameed Abdulkareem. "Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition". Sensors 21, n.º 11 (7 de junio de 2021): 3922. http://dx.doi.org/10.3390/s21113922.
Texto completoJohnston, Ed. "The adversarial defence lawyer: Myths, disclosure and efficiency—A contemporary analysis of the role in the era of the Criminal Procedure Rules". International Journal of Evidence & Proof 24, n.º 1 (26 de agosto de 2019): 35–58. http://dx.doi.org/10.1177/1365712719867972.
Texto completoXu, Enhui, Xiaolin Zhang, Yongping Wang, Shuai Zhang, Lixin Lu y Li Xu. "WordRevert: Adversarial Examples Defence Method for Chinese Text Classification". IEEE Access 10 (2022): 28832–41. http://dx.doi.org/10.1109/access.2022.3157521.
Texto completoBruce, Neil. "Defence expenditures by countries in allied and adversarial relationships". Defence Economics 1, n.º 3 (mayo de 1990): 179–95. http://dx.doi.org/10.1080/10430719008404661.
Texto completoStriletska, Oksana. "Establishment and Development of the Adversarial Principle in the Criminal Process". Path of Science 7, n.º 7 (31 de julio de 2021): 1010–16. http://dx.doi.org/10.22178/pos.72-2.
Texto completoMacfarlane, Julie. "The Anglican Church’s sexual abuse defence playbook". Theology 124, n.º 3 (mayo de 2021): 182–89. http://dx.doi.org/10.1177/0040571x211008547.
Texto completoZhang, Bowen, Benedetta Tondi, Xixiang Lv y Mauro Barni. "Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes". Security and Communication Networks 2020 (12 de noviembre de 2020): 1–11. http://dx.doi.org/10.1155/2020/8882494.
Texto completoTesis sobre el tema "Adversarial Defence"
Stiff, Harald. "Explainable AI as a Defence Mechanism for Adversarial Examples". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.
Texto completoDjupinlärning är den bästa metoden för bildklassificeringsuppgifter. Med dess introduktion kom många imponerande förbättringar inom datorseende som överträffade samtliga tidigare maskininlärningsmodeller. Samtidigt har det i kontrast till alla framgångar visat sig att djupa neuronnät lätt luras av motstridiga exempel, data som har modifierats för att få neurala nätverk att göra felaktiga klassificeringar. Denna nackdel har orsakat ett ökat tvivel gällande huruvida neuronnät är säkra att använda i praktiken. I detta examensarbete föreslås en ny försvarsmekanism mot motstridiga exempel som utnyttjar förklarbar AI för att filtrera bort motstridiga exempel innan de kommer i kontakt med modellerna. Vi utvärderar filtren mot olika attacker och modeller riktade till MNIST-, Fashion-MNIST-, och Cifar10-dataseten. Resultaten visar att filtren kan upptäcka motstridiga exempel konstruerade med vanliga attacker, men att de inte är robusta mot adaptiva attacker som specifikt utnyttjar försvarsmekanismens arkitektur.
Garcia, Dennis Alberto. "Peer-to-peer network modeling for adversarial proactive cyber defenses". Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112849.
Texto completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 49-50).
This thesis implements a novel peer-to-peer network simulator that integrates co-evolutionary algorithms in order to model adversarial attack and defense dynamics in networks. Modeling this behavior is desirable as it allows for network designers to better develop network defense strategies against adaptive cyber attackers. By developing a network simulator that implements a peer-to-peer protocol, we were able to control the environment and abstract away many of the complex details that would normally arise from using a live network. Because of this environment, we were able to design attack and defense models and grammars, construct arbitrary network topologies, and rapidly test adversarial behavior using the integrated coevolutionary algorithms. Second, the thesis implements the integration of the coevolutionary algorithms with a more complex, proprietary emulator that implements an advanced version of Chord. Our experiments with this system start to investigate the effectiveness of peer-to-peer networks as defenders as well as elucidate the issues of integrating coevolutionary algorithms in a real-world system.
by Dennis Alberto Garcia.
M. Eng.
Coulibaly, Ibrahima. "Les droits de la défense en droit mauritanien". Thesis, Paris 8, 2018. http://www.theses.fr/2018PA080008.
Texto completoUniversalism of the rights have come the concept the rights of the defenses diversity of procedural. A the level of each country, however big or small, whatever is its culture, he (It) is accepted and official that we cannot judge without referring to the fundamental rules (rulers), and without being attended by a lawyer. Rights of defence are guaranteed in Mauritanie by the law number 2007-036 carrying Code of criminal procedure, the law number 2007-012 carrying the judicial organization, the law number 99–035 carrying Code of civil procedure, commercial and administrative. The rules of rights of defence not wind not to be reached without the implementation of organs which frame the capacities of this one. The equality before the courts is expressly considered by fundamental law in the of the constitution owed July 20th, 1991. However, the principle is of no real reach in spite of the precision of the text. What seems absurd with our model of system of ineffective right, imply that the rules of the fair trial are not allocated in a egalitarian way to all. It is not the only difficulty or the ambiguity. The present study supports on one hand that the exercice of the equality of the contradictory and the equality of weapons guarantees the effectiveness of rights of defence, and on the other hand, that the development of the principles participates in a revival oo the rights.The contemporary position of rights of defence uses this notion demonstrating, often rights of defence as a superior implication and of a logical obvious fact of the procedure, thus obeying the fundamental criteria of the right to fair trial. He is determined by a whole series of procedures led in a trial and declares itself, today, under a set of legal bases protecting rights of defence. To this end we had tried to make a work of unpretentious sociological evaluation of perfect scientificity. Avoiding any legalism or positivism, the work stays nevertheless in legal dominance
Wood, Adrian Michael. "A defensive strategy for detecting targeted adversarial poisoning attacks in machine learning trained malware detection models". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2483.
Texto completoKanerva, Anton y Fredrik Helgesson. "On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data". Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.
Texto completoKontext. Maskininlärning är ett område inom artificiell intelligens som är under konstant utveckling. Mängden domäner som vi sprider maskininlärningsmodeller i växer sig allt större och systemen sprider sig obemärkt nära inpå våra dagliga liv genom olika elektroniska enheter. Genom åren har mycket tid och arbete lagts på att öka dessa modellers prestanda vilket har överskuggat risken för sårbarheter i systemens kärna, den tränade modellen. En relativt ny attack, kallad "adversarial input attack", med målet att lura modellen till felaktiga beslutstaganden har nästan uteslutande forskats på inom bildigenkänning. Men, hotet som adversarial input-attacker utgör sträcker sig utom ramarna för bilddata till andra datadomäner som den tabulära domänen vilken är den vanligaste datadomänen inom industrin. Metoder för att tolka komplexa maskininlärningsmodeller kan hjälpa människor att förstå beteendet hos dessa komplexa maskininlärningssystem samt de beslut som de tar. Att förstå en modells beteende är en viktig komponent för att upptäcka, förstå och mitigera sårbarheter hos modellen. Syfte. Den här studien försöker reducera det forskningsgap som adversarial input-attacker och motsvarande försvarsmetoder i den tabulära domänen utgör. Målet med denna studie är att analysera hur modelloberoende tolkningsmetoder kan användas för att mitigera och detektera adversarial input-attacker mot tabulär data. Metod. Det uppsatta målet nås genom tre på varandra följande experiment där modelltolkningsmetoder analyseras, adversarial input-attacker utvärderas och visualiseras samt där en ny metod baserad på modelltolkning föreslås för detektion av adversarial input-attacker tillsammans med en ny mitigeringsteknik där feature selection används defensivt för att minska attackvektorns storlek. Resultat. Den föreslagna metoden för detektering av adversarial input-attacker visar state-of-the-art-resultat med över 86% träffsäkerhet. Den föreslagna mitigeringstekniken visades framgångsrik i att härda modellen mot adversarial input attacker genom att minska deras attackstyrka med 33% utan att degradera modellens klassifieringsprestanda. Slutsats. Denna studie bidrar med användbara metoder för detektering och mitigering av adversarial input-attacker såväl som metoder för att utvärdera och visualisera svårt förnimbara attacker mot tabulär data.
Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Texto completoJobert, Sylvain. "La connaissance des actes du procès civil par les parties". Thesis, Paris 2, 2016. http://www.theses.fr/2016PA020070.
Texto completoIn civil law procedures, the parties’ knowledge of the acts of the trial is essential; it guarantees that certain principles, such as the adversarial principle, will be respected. However, a difficulty arises: it is hard to determine whether a party has in fact become aware of the act which was communicated to him. The question is to determine whether the law can accept such a difficulty. To this end, two divergent models can be provided. In the formalistic one, the choice is made to favor the knowledge of the acts of the trial beforehand, in order to be able to become disinterested in their actual knowledge afterwards, all the means having been implemented to carry this out. In the realistic one, the way in which the acts of the trial are brought to the parties' attention is neglected, but thereafter, there is a resurgent focus on the knowledge the parties have genuinely had. The study reveals that the law of civil trial was initially based on a predominantly formalistic model, but this model has evolved, especially during the last decade. Under the influence of contemporary concerns in order to rationalize justice costs and increase the protection of the parties' fundamental rights, the formalism of civil lawsuit has been tempered. Should it be even more moderate? This work neither pleads for the subversion of the classical model nor for its reinstatement. Instead, it is a nuanced evolution of the law which is suggested. It suggests to promote formalism when legal certainty requires it, without sacrificing the benefit of lightening the rules when it is necessary
Metenier, Julian. "La protection pénale de l'accusé". Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1065.
Texto completoThe theme of the criminal protection of the accused, well-known to criminal specialists, today deserves to be renewed under a probationary essentially angle, in the light of current developments in the criminal trial. Located at the confluence of innocence and guilt, the rights and guarantees granted to the accused understood in its conventional sense, must be analyzed in consideration of the founding principles of presumption of innocence and the rights of the defense. The continuing evolution of these two principles, in a sense diametrically opposite, inevitably reflects the intensity and the terms of the protection afforded any person suspected or prosecuted under criminal proceedings.This study deliberately limited to the pre-trial phase, proposes to understand, in a practical and technical problems, the various case law and legislative developments carried out in the field. Will thus addressed the key issues currently faced in criminal proceedings such as the question of the legal status of the suspect or the effectiveness of the adversarial principle in the preliminary criminal trial. While it may be tempting, at first, to conclude an indisputable strengthening the criminal protection afforded to the accused, then it will be necessary to reconsider this issue in terms of the study of procedural limitations attached to the criminal trial. Far from addressing this issue in a partisan way, it will be about moderation in the remarks. Indeed, perhaps more than any other issue of criminal procedure, it is imperative to keep a sense of proportion
Borges, Lélia Moreira. "Adolescente em conflito com a lei: uma análise do direito à ampla defesa em Goiânia/Goiás". Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/8806.
Texto completoApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2018-08-17T11:20:43Z (GMT) No. of bitstreams: 2 Dissertação - Lélia Moreira Borges - 2017.pdf: 1967491 bytes, checksum: 0c533712e13300a3711e215ad48229a5 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-08-17T11:20:43Z (GMT). No. of bitstreams: 2 Dissertação - Lélia Moreira Borges - 2017.pdf: 1967491 bytes, checksum: 0c533712e13300a3711e215ad48229a5 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-08-31
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This dissertation had as its objective verify whether the adolescents submitted to the institutionalization measures in Goiânia, Goiás – Brazil, were guaranteed their right to the adversarial principle and full defense in their trials. The empirical field of this investigation consisted of the analysis of cases filed between the periods of 2014 to 2016, and the observation of hearings carried out in the infractions court of Child and Youth Court of Goiânia, GO and interviews with public defenders. The Federal Constitution of 1988, the Child and Adolescent Statute, Criminal Code, Criminal Procedure and Civil Procedure Codes were used as the main legal references for this study. As theoretical support, Emílio G. Mendez, Pierre Bourdieu and Loïc Wacquant were also used. These references were useful in the understanding of the infraction persecution dynamics operationalized by the security and justice system of the State. As well as that, the understanding of the socio-juridical paradigm in force at each moment of history that justified the penalization of children and adolescents; the concept of field as a social space in competition, subject to internal disputes hierarchically established by the monopoly of the significance of such space, and the intensification of punitive actions by the State allow the perception of the permanence of the irregular situation paradigm in the professionals’ performances and judicial decisions. Decisions marked by inequality between institutions that operate in the juvenile criminal justice system, facing the recent entry of the public defense counsel, not yet totally structured, in the game of signification and legitimation of a trial that is preponderantly inquisitive. It brings loss to the exercise of full defense of the adolescents accused of acts of infraction. Evidence of a mismatch is noticed between the advances in the children’s and adolescents’ acquisition of rights and guarantees and the criminal control operationalized by the juvenile criminal justice system of Goiânia / GO.
Essa dissertação teve como objetivo verificar se os adolescentes submetidos à medida de internação em Goiânia/Goiás tiveram garantidos o direito ao contraditório e a ampla defesa nos seus julgamentos. O campo empírico desta investigação consistiu na análise de processos arquivados entre os períodos de 2014 a 2016, da observação de audiências realizadas na vara de atos infracionais do Juizado da Infância e Juventude de Goiânia/GO e de entrevistas aos defensores públicos. A Constituição Federal de 1988, Estatuto da Criança e do Adolescente, Códigos Penal, de Processo Penal e de Processo Civil foram referência para este estudo. Como suportes teóricos foram utilizados, entre outros, Emílio G. Mendez, Pierre Bourdieu e Loïc Wacquant. Esses referenciais serviram de suporte para entender os diferentes paradigmas jurídicos que justificaram a aplicação de penalização de crianças e adolescentes no decorrer da história apresentados por Mendez: nas considerações para uma sociologia do campo jurídico deixadas por Pierre Bourdieu sobre a força do direito, enquanto instrumento de poder da reprodução social e, nas discussões apresentas por Wacquant acerca do controle social e do estado punitivo. Permitindo assim, perceber a permanência do paradigma da situação irregular na atuação dos profissionais e nas decisões judiciais; a desigualdade entre instituições que atuam no sistema de justiça penal juvenil, dada a recente entrada da Defensoria Pública ainda não totalmente estruturada, no jogo da significação e legitimação de um julgamento preponderantemente inquisitivo, ocasionando com isso, prejuízo ao exercício pleno da defesa dos(as) adolescentes acusados(as) de atos infracionais. Evidenciando um descompasso entre os avanços na conquista de direitos e garantias das crianças e adolescentes e o controle social operacionalizado pelo sistema de justiça penal juvenil de Goiânia/GO.
Nga, Essomba Tergalise. "La protection des droits de l'accusé devant la cour pénale internationale". Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30005.
Texto completoProtecting the rights of the accused depends in any legal debate on respect for a fair trial. In doing so, the creation of the ICC merits special attention by virtue not only of its being permanent and universal, but also the extent of international crimes with which it deals. As a result of this broad scope, research suggests any protective coverage is relative in its effectiveness and utopian, despite the requirement of compatibility of the law applicable to internationally recognized human rights. The apparent respect for these rights, the principle of due process and the requirement of the presence of the accused at his or her trial do not guarantee an effective equality of arms, the exercise of one’s rights or respect for the presumption of innocence. Instead, the procedural rule of imbalance, the excessive length of trials and the continued detention of the accused have led to objections about effectively protecting the rights of the accused. So-called protection gives way instead to the fight against impunity, the reticence of victims and witnesses and the sovereignty of States. Following this study, it is necessary to rebalance the rights of the parties and rethink the jurisdiction of the Court
Libros sobre el tema "Adversarial Defence"
Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang y Michael Wellman, eds. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.
Texto completoHausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2014.
Buscar texto completoHausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2012.
Buscar texto completoHausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2014.
Buscar texto completoHausman, David. Securities law in the adversarial setting. Toronto]: Faculty of Law, University of Toronto, 2013.
Buscar texto completoRose, Clive. Campaigns against western defence: NATO's adversaries and critics. 2a ed. Basingstoke: Macmillan, 1986.
Buscar texto completoRose, Clive. Campaigns against western defence: NATO's adversaries and critics. New York: St. Martin's Press, 1985.
Buscar texto completoCampaigns against Western defence: NATO's adversaries and critics. Basingstoke: Macmillan, 1985.
Buscar texto completoRose, Clive. Campaigns against Western defence: NATO's adversaries and critics. Basingstoke: Macmillan, 1985.
Buscar texto completoCampaigns against western defence: NATO's adversaries and critics. 2a ed. Houndmills, Basingstoke, Hampshire: Macmillan, 1986.
Buscar texto completoCapítulos de libros sobre el tema "Adversarial Defence"
Zheng, Yanbin, Hongxu Yun, Fu Wang, Yong Ding, Yongzhong Huang y Wenfen Liu. "Defence Against Adversarial Attacks Using Clustering Algorithm". En Communications in Computer and Information Science, 323–33. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0118-0_25.
Texto completoKamath, Aayush, Vrinda Bhatu, Tejas Paranjape y Rupali Sawant. "Malware Classification and Defence Against Adversarial Attacks". En Proceedings of Data Analytics and Management, 267–74. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6285-0_22.
Texto completoGittings, T., S. Schneider y J. Collomosse. "Vax-a-Net: Training-Time Defence Against Adversarial Patch Attacks". En Computer Vision – ACCV 2020, 235–51. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69538-5_15.
Texto completoTaran, Olga, Shideh Rezaeifar y Slava Voloshynovskiy. "Bridging Machine Learning and Cryptography in Defence Against Adversarial Attacks". En Lecture Notes in Computer Science, 267–79. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11012-3_23.
Texto completoZhou, Jiahui, Nayyar Zaidi, Yishuo Zhang y Gang Li. "Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data". En Advances in Knowledge Discovery and Data Mining, 367–79. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05936-0_29.
Texto completoRose, Clive. "Adversaries and Critics". En Campaigns Against Western Defence, 3–18. London: Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-07526-3_1.
Texto completoRose, Clive. "Adversaries and Critics". En Campaigns Against Western Defence, 3–18. London: Palgrave Macmillan UK, 1986. http://dx.doi.org/10.1007/978-1-349-18523-8_1.
Texto completoShao, Rui, Pramuditha Perera, Pong C. Yuen y Vishal M. Patel. "Open-Set Adversarial Defense". En Computer Vision – ECCV 2020, 682–98. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58520-4_40.
Texto completoKuribayashi, Minoru. "Defense Against Adversarial Attacks". En Frontiers in Fake Media Generation and Detection, 131–48. Singapore: Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1524-6_6.
Texto completoXu, Ying, Kiran Raja, Raghavendra Ramachandra y Christoph Busch. "Adversarial Attacks on Face Recognition Systems". En Handbook of Digital Face Manipulation and Detection, 139–61. Cham: Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_7.
Texto completoActas de conferencias sobre el tema "Adversarial Defence"
Oneto, Luca, Sandro Ridella y Davide Anguita. "The Benefits of Adversarial Defence in Generalisation". En ESANN 2021 - European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Louvain-la-Neuve (Belgium): Ciaco - i6doc.com, 2021. http://dx.doi.org/10.14428/esann/2021.es2021-28.
Texto completoXu, Ying, Xu Zhong, Antonio Jimeno Yepes y Jey Han Lau. "Grey-box Adversarial Attack And Defence For Sentiment Classification". En Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies. Stroudsburg, PA, USA: Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.naacl-main.321.
Texto completoXu, Tongyang y Zhongxiang Wei. "Waveform Defence Against Deep Learning Generative Adversarial Network Attacks". En 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). IEEE, 2022. http://dx.doi.org/10.1109/csndsp54353.2022.9907905.
Texto completoCouturier, Antonin y Anton-David Almasan. "Semi-supervised Domain Adaptation via adversarial training". En 2021 Sensor Signal Processing for Defence Conference (SSPD). IEEE, 2021. http://dx.doi.org/10.1109/sspd51364.2021.9541427.
Texto completoGouk, Henry y Timothy M. Hospedales. "Optimising Network Architectures for Provable Adversarial Robustness". En 2020 Sensor Signal Processing for Defence Conference (SSPD). IEEE, 2020. http://dx.doi.org/10.1109/sspd47486.2020.9272169.
Texto completoZoto, Erjon, Stewart Kowalski, Christopher Frantz, Basel Katt y Edgar Lopez-Rojas. "CyberAIMs: a tool for teaching adversarial and systems thinking". En The 8th International Defence and Homeland Security Simulation Workshop. CAL-TEK srl, 2018. http://dx.doi.org/10.46354/i3m.2018.dhss.004.
Texto completoTan, Wei, Jiajia Zhao, Xinkai Liang, Hanchen Lu, Baogang Song y Hao Guan. "Adversarial Example Attack and Defence of Object Recognition: A Survey". En 2022 IEEE International Conference on Unmanned Systems (ICUS). IEEE, 2022. http://dx.doi.org/10.1109/icus55513.2022.9986597.
Texto completoMakridis, Georgios, Spyros Theodoropoulos, Dimitrios Dardanis, Ioannis Makridis, Maria Margarita Separdani, Georgios Fatouros, Dimosthenis Kyriazis y Panagiotis Koulouris. "XAI enhancing cyber defence against adversarial attacks in industrial applications". En 2022 IEEE 5th International Conference on Image Processing Applications and Systems (IPAS). IEEE, 2022. http://dx.doi.org/10.1109/ipas55744.2022.10052858.
Texto completoNakane, Ikuko. "Accusation, defence and morality in Japanese trials: A Hybrid Orientation to Criminal Justice". En GLOCAL Conference on Asian Linguistic Anthropology 2019. The GLOCAL Unit, SOAS University of London, 2019. http://dx.doi.org/10.47298/cala2019.16-5.
Texto completoHan, Yi, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan y Sarah Erfani. "Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence". En 2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020. http://dx.doi.org/10.1109/ijcnn48605.2020.9206634.
Texto completoInformes sobre el tema "Adversarial Defence"
Allan, Duncan y Ian Bond. A new Russia policy for post-Brexit Britain. Royal Institute of International Affairs, enero de 2022. http://dx.doi.org/10.55317/9781784132842.
Texto completoCollazo, Hector III L. Defending Against Opposed Patterns of Resistant: Can Past Cultural Lessons in Armed Conflict Help U.S. Identify, Defend, Adapt, or Exploit Notions of Resistant With New Adversaries Like ISIS. Fort Belvoir, VA: Defense Technical Information Center, mayo de 2015. http://dx.doi.org/10.21236/ad1012800.
Texto completo