Tesis sobre el tema "Adversarial Defence"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 25 mejores tesis para su investigación sobre el tema "Adversarial Defence".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore tesis sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Stiff, Harald. "Explainable AI as a Defence Mechanism for Adversarial Examples". Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.
Texto completoDjupinlärning är den bästa metoden för bildklassificeringsuppgifter. Med dess introduktion kom många imponerande förbättringar inom datorseende som överträffade samtliga tidigare maskininlärningsmodeller. Samtidigt har det i kontrast till alla framgångar visat sig att djupa neuronnät lätt luras av motstridiga exempel, data som har modifierats för att få neurala nätverk att göra felaktiga klassificeringar. Denna nackdel har orsakat ett ökat tvivel gällande huruvida neuronnät är säkra att använda i praktiken. I detta examensarbete föreslås en ny försvarsmekanism mot motstridiga exempel som utnyttjar förklarbar AI för att filtrera bort motstridiga exempel innan de kommer i kontakt med modellerna. Vi utvärderar filtren mot olika attacker och modeller riktade till MNIST-, Fashion-MNIST-, och Cifar10-dataseten. Resultaten visar att filtren kan upptäcka motstridiga exempel konstruerade med vanliga attacker, men att de inte är robusta mot adaptiva attacker som specifikt utnyttjar försvarsmekanismens arkitektur.
Garcia, Dennis Alberto. "Peer-to-peer network modeling for adversarial proactive cyber defenses". Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112849.
Texto completoThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 49-50).
This thesis implements a novel peer-to-peer network simulator that integrates co-evolutionary algorithms in order to model adversarial attack and defense dynamics in networks. Modeling this behavior is desirable as it allows for network designers to better develop network defense strategies against adaptive cyber attackers. By developing a network simulator that implements a peer-to-peer protocol, we were able to control the environment and abstract away many of the complex details that would normally arise from using a live network. Because of this environment, we were able to design attack and defense models and grammars, construct arbitrary network topologies, and rapidly test adversarial behavior using the integrated coevolutionary algorithms. Second, the thesis implements the integration of the coevolutionary algorithms with a more complex, proprietary emulator that implements an advanced version of Chord. Our experiments with this system start to investigate the effectiveness of peer-to-peer networks as defenders as well as elucidate the issues of integrating coevolutionary algorithms in a real-world system.
by Dennis Alberto Garcia.
M. Eng.
Coulibaly, Ibrahima. "Les droits de la défense en droit mauritanien". Thesis, Paris 8, 2018. http://www.theses.fr/2018PA080008.
Texto completoUniversalism of the rights have come the concept the rights of the defenses diversity of procedural. A the level of each country, however big or small, whatever is its culture, he (It) is accepted and official that we cannot judge without referring to the fundamental rules (rulers), and without being attended by a lawyer. Rights of defence are guaranteed in Mauritanie by the law number 2007-036 carrying Code of criminal procedure, the law number 2007-012 carrying the judicial organization, the law number 99–035 carrying Code of civil procedure, commercial and administrative. The rules of rights of defence not wind not to be reached without the implementation of organs which frame the capacities of this one. The equality before the courts is expressly considered by fundamental law in the of the constitution owed July 20th, 1991. However, the principle is of no real reach in spite of the precision of the text. What seems absurd with our model of system of ineffective right, imply that the rules of the fair trial are not allocated in a egalitarian way to all. It is not the only difficulty or the ambiguity. The present study supports on one hand that the exercice of the equality of the contradictory and the equality of weapons guarantees the effectiveness of rights of defence, and on the other hand, that the development of the principles participates in a revival oo the rights.The contemporary position of rights of defence uses this notion demonstrating, often rights of defence as a superior implication and of a logical obvious fact of the procedure, thus obeying the fundamental criteria of the right to fair trial. He is determined by a whole series of procedures led in a trial and declares itself, today, under a set of legal bases protecting rights of defence. To this end we had tried to make a work of unpretentious sociological evaluation of perfect scientificity. Avoiding any legalism or positivism, the work stays nevertheless in legal dominance
Wood, Adrian Michael. "A defensive strategy for detecting targeted adversarial poisoning attacks in machine learning trained malware detection models". Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2483.
Texto completoKanerva, Anton y Fredrik Helgesson. "On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data". Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.
Texto completoKontext. Maskininlärning är ett område inom artificiell intelligens som är under konstant utveckling. Mängden domäner som vi sprider maskininlärningsmodeller i växer sig allt större och systemen sprider sig obemärkt nära inpå våra dagliga liv genom olika elektroniska enheter. Genom åren har mycket tid och arbete lagts på att öka dessa modellers prestanda vilket har överskuggat risken för sårbarheter i systemens kärna, den tränade modellen. En relativt ny attack, kallad "adversarial input attack", med målet att lura modellen till felaktiga beslutstaganden har nästan uteslutande forskats på inom bildigenkänning. Men, hotet som adversarial input-attacker utgör sträcker sig utom ramarna för bilddata till andra datadomäner som den tabulära domänen vilken är den vanligaste datadomänen inom industrin. Metoder för att tolka komplexa maskininlärningsmodeller kan hjälpa människor att förstå beteendet hos dessa komplexa maskininlärningssystem samt de beslut som de tar. Att förstå en modells beteende är en viktig komponent för att upptäcka, förstå och mitigera sårbarheter hos modellen. Syfte. Den här studien försöker reducera det forskningsgap som adversarial input-attacker och motsvarande försvarsmetoder i den tabulära domänen utgör. Målet med denna studie är att analysera hur modelloberoende tolkningsmetoder kan användas för att mitigera och detektera adversarial input-attacker mot tabulär data. Metod. Det uppsatta målet nås genom tre på varandra följande experiment där modelltolkningsmetoder analyseras, adversarial input-attacker utvärderas och visualiseras samt där en ny metod baserad på modelltolkning föreslås för detektion av adversarial input-attacker tillsammans med en ny mitigeringsteknik där feature selection används defensivt för att minska attackvektorns storlek. Resultat. Den föreslagna metoden för detektering av adversarial input-attacker visar state-of-the-art-resultat med över 86% träffsäkerhet. Den föreslagna mitigeringstekniken visades framgångsrik i att härda modellen mot adversarial input attacker genom att minska deras attackstyrka med 33% utan att degradera modellens klassifieringsprestanda. Slutsats. Denna studie bidrar med användbara metoder för detektering och mitigering av adversarial input-attacker såväl som metoder för att utvärdera och visualisera svårt förnimbara attacker mot tabulär data.
Branlat, Matthieu. "Challenges to Adversarial Interplay Under High Uncertainty: Staged-World Study of a Cyber Security Event". The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Texto completoJobert, Sylvain. "La connaissance des actes du procès civil par les parties". Thesis, Paris 2, 2016. http://www.theses.fr/2016PA020070.
Texto completoIn civil law procedures, the parties’ knowledge of the acts of the trial is essential; it guarantees that certain principles, such as the adversarial principle, will be respected. However, a difficulty arises: it is hard to determine whether a party has in fact become aware of the act which was communicated to him. The question is to determine whether the law can accept such a difficulty. To this end, two divergent models can be provided. In the formalistic one, the choice is made to favor the knowledge of the acts of the trial beforehand, in order to be able to become disinterested in their actual knowledge afterwards, all the means having been implemented to carry this out. In the realistic one, the way in which the acts of the trial are brought to the parties' attention is neglected, but thereafter, there is a resurgent focus on the knowledge the parties have genuinely had. The study reveals that the law of civil trial was initially based on a predominantly formalistic model, but this model has evolved, especially during the last decade. Under the influence of contemporary concerns in order to rationalize justice costs and increase the protection of the parties' fundamental rights, the formalism of civil lawsuit has been tempered. Should it be even more moderate? This work neither pleads for the subversion of the classical model nor for its reinstatement. Instead, it is a nuanced evolution of the law which is suggested. It suggests to promote formalism when legal certainty requires it, without sacrificing the benefit of lightening the rules when it is necessary
Metenier, Julian. "La protection pénale de l'accusé". Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1065.
Texto completoThe theme of the criminal protection of the accused, well-known to criminal specialists, today deserves to be renewed under a probationary essentially angle, in the light of current developments in the criminal trial. Located at the confluence of innocence and guilt, the rights and guarantees granted to the accused understood in its conventional sense, must be analyzed in consideration of the founding principles of presumption of innocence and the rights of the defense. The continuing evolution of these two principles, in a sense diametrically opposite, inevitably reflects the intensity and the terms of the protection afforded any person suspected or prosecuted under criminal proceedings.This study deliberately limited to the pre-trial phase, proposes to understand, in a practical and technical problems, the various case law and legislative developments carried out in the field. Will thus addressed the key issues currently faced in criminal proceedings such as the question of the legal status of the suspect or the effectiveness of the adversarial principle in the preliminary criminal trial. While it may be tempting, at first, to conclude an indisputable strengthening the criminal protection afforded to the accused, then it will be necessary to reconsider this issue in terms of the study of procedural limitations attached to the criminal trial. Far from addressing this issue in a partisan way, it will be about moderation in the remarks. Indeed, perhaps more than any other issue of criminal procedure, it is imperative to keep a sense of proportion
Borges, Lélia Moreira. "Adolescente em conflito com a lei: uma análise do direito à ampla defesa em Goiânia/Goiás". Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/8806.
Texto completoApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2018-08-17T11:20:43Z (GMT) No. of bitstreams: 2 Dissertação - Lélia Moreira Borges - 2017.pdf: 1967491 bytes, checksum: 0c533712e13300a3711e215ad48229a5 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-08-17T11:20:43Z (GMT). No. of bitstreams: 2 Dissertação - Lélia Moreira Borges - 2017.pdf: 1967491 bytes, checksum: 0c533712e13300a3711e215ad48229a5 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-08-31
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This dissertation had as its objective verify whether the adolescents submitted to the institutionalization measures in Goiânia, Goiás – Brazil, were guaranteed their right to the adversarial principle and full defense in their trials. The empirical field of this investigation consisted of the analysis of cases filed between the periods of 2014 to 2016, and the observation of hearings carried out in the infractions court of Child and Youth Court of Goiânia, GO and interviews with public defenders. The Federal Constitution of 1988, the Child and Adolescent Statute, Criminal Code, Criminal Procedure and Civil Procedure Codes were used as the main legal references for this study. As theoretical support, Emílio G. Mendez, Pierre Bourdieu and Loïc Wacquant were also used. These references were useful in the understanding of the infraction persecution dynamics operationalized by the security and justice system of the State. As well as that, the understanding of the socio-juridical paradigm in force at each moment of history that justified the penalization of children and adolescents; the concept of field as a social space in competition, subject to internal disputes hierarchically established by the monopoly of the significance of such space, and the intensification of punitive actions by the State allow the perception of the permanence of the irregular situation paradigm in the professionals’ performances and judicial decisions. Decisions marked by inequality between institutions that operate in the juvenile criminal justice system, facing the recent entry of the public defense counsel, not yet totally structured, in the game of signification and legitimation of a trial that is preponderantly inquisitive. It brings loss to the exercise of full defense of the adolescents accused of acts of infraction. Evidence of a mismatch is noticed between the advances in the children’s and adolescents’ acquisition of rights and guarantees and the criminal control operationalized by the juvenile criminal justice system of Goiânia / GO.
Essa dissertação teve como objetivo verificar se os adolescentes submetidos à medida de internação em Goiânia/Goiás tiveram garantidos o direito ao contraditório e a ampla defesa nos seus julgamentos. O campo empírico desta investigação consistiu na análise de processos arquivados entre os períodos de 2014 a 2016, da observação de audiências realizadas na vara de atos infracionais do Juizado da Infância e Juventude de Goiânia/GO e de entrevistas aos defensores públicos. A Constituição Federal de 1988, Estatuto da Criança e do Adolescente, Códigos Penal, de Processo Penal e de Processo Civil foram referência para este estudo. Como suportes teóricos foram utilizados, entre outros, Emílio G. Mendez, Pierre Bourdieu e Loïc Wacquant. Esses referenciais serviram de suporte para entender os diferentes paradigmas jurídicos que justificaram a aplicação de penalização de crianças e adolescentes no decorrer da história apresentados por Mendez: nas considerações para uma sociologia do campo jurídico deixadas por Pierre Bourdieu sobre a força do direito, enquanto instrumento de poder da reprodução social e, nas discussões apresentas por Wacquant acerca do controle social e do estado punitivo. Permitindo assim, perceber a permanência do paradigma da situação irregular na atuação dos profissionais e nas decisões judiciais; a desigualdade entre instituições que atuam no sistema de justiça penal juvenil, dada a recente entrada da Defensoria Pública ainda não totalmente estruturada, no jogo da significação e legitimação de um julgamento preponderantemente inquisitivo, ocasionando com isso, prejuízo ao exercício pleno da defesa dos(as) adolescentes acusados(as) de atos infracionais. Evidenciando um descompasso entre os avanços na conquista de direitos e garantias das crianças e adolescentes e o controle social operacionalizado pelo sistema de justiça penal juvenil de Goiânia/GO.
Nga, Essomba Tergalise. "La protection des droits de l'accusé devant la cour pénale internationale". Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30005.
Texto completoProtecting the rights of the accused depends in any legal debate on respect for a fair trial. In doing so, the creation of the ICC merits special attention by virtue not only of its being permanent and universal, but also the extent of international crimes with which it deals. As a result of this broad scope, research suggests any protective coverage is relative in its effectiveness and utopian, despite the requirement of compatibility of the law applicable to internationally recognized human rights. The apparent respect for these rights, the principle of due process and the requirement of the presence of the accused at his or her trial do not guarantee an effective equality of arms, the exercise of one’s rights or respect for the presumption of innocence. Instead, the procedural rule of imbalance, the excessive length of trials and the continued detention of the accused have led to objections about effectively protecting the rights of the accused. So-called protection gives way instead to the fight against impunity, the reticence of victims and witnesses and the sovereignty of States. Following this study, it is necessary to rebalance the rights of the parties and rethink the jurisdiction of the Court
Thiam, Sangoné. "Droits de la défense et enquête policière". Thesis, Pau, 2018. http://www.theses.fr/2018PAUU2034/document.
Texto completoDid the person who dared to infringe a value criminally protected by the society deserve any defense from that latter? This defence has been controversial for a long time, while some have been in favor, others have been resolutely hostile. The compromise consisted in refusing the rights of the defense in the police investigation by adopting an inquisitorial system and devoting them largely in the judgment phase with an adversarial system. This diversity of the procedure seems a priori to answer the conflicting interests at the heart of the criminal proceedings. But in the light of fundamental rights and under the influence of international and European provisions, this conception of procedure becomes inappropriate. The rights of the defense, as well as the rights to fair trial must no longer be limited, they must govern the entire procedure from the police investigation to the trial stage. How would rights that initially applied only before an independent and impartial jurisdiction break into the police investigation without the existence of a judge providing guarantees equivalent to those of the trial court? If the legislator first introduced the rights of defense in the criminal investigation phase, the decline of the latter in favor of the police investigation should push him to extend them. In fact, this is what he has started to do, but in a timorous way. Not only does the effectiveness of the rights of the defense in the police investigation require to be enlarged, but it also allows putting in place an independent and impartial judge responsible for ensuring their full implementation as in the trial stage. A jurisdictionalization of the police investigation is now a requirement
Kardimis, Théofanis. "La chambre criminelle de la Cour de cassation face à l’article 6 de la Convention européenne des droits de l’homme : étude juridictionnelle comparée (France-Grèce)". Thesis, Lyon, 2017. http://www.theses.fr/2017LYSE3004.
Texto completoThe first party of the study is dedicated to the invocation of the right to a fair trial intra and extra muros and, on this basis, it focuses on the direct applicability of Article 6 and the subsidiarity of the Convention and of the European Court of Human Rights. Because of the fact that the right to a fair trial is a ‘‘judge-made law’’, the study also focuses on the invocability of the judgments of the European Court and more precisely on the direct invocability of the European Court’s judgment finding that there has been a violation of the Convention and on the request for an interpretation in accordance with the European Court’s decisions. The possibility of reviewing the criminal judgment made in violation of the Convention has generated a new right of access to the Court of cassation which particularly concerns the violations of the right to a fair trial and is probably the most important step for the respect of the right to a fair trial after enabling the right of individual petition. As for the weak conventional basis of the authority of res interpretata (“autorité de la chose interprétée”), this fact explains why an indirect dialogue between the ECHR and the Court of cassation is possible but doesn’t affect the applicant’s right to request an interpretation in accordance with the Court’s decisions and the duty of the Court of cassation to explain why it has decided to depart from the (non-binding) precedent.The second party of the study is bigger than the first one and is dedicated to the guarantees of the proper administration of justice (Article 6§1), the presumption of innocence (Article 6§2), the rights which find their conventional basis on the Article 6§1 but their logical explanation to the presumption of innocence and the rights of defence (Article 6§3). More precisely, the second party of the study is analyzing the right to an independent and impartial tribunal established by law, the right to a hearing within a reasonable time, the principle of equality of arms, the right to adversarial proceedings, the right of the defence to the last word, the right to a public hearing and a public pronouncement of the judgement, the judge’s duty to state the reasons for his decision, the presumption of innocence, in both its procedural and personal dimensions, the accused’s right to lie, his right to remain silent, his right against self-incrimination, his right to be informed of the nature and the cause of the accusation and the potential re-characterisation of the facts, his right to have adequate time and facilities for the preparation of the defence, including in particular the access to the case-file and the free and confidential communication with his lawyer, his right to appear in person at the trial, his right to defend either in person or through legal assistance, his right to be represented by his counsel, his right to free legal aid if he hasn’t sufficient means to pay for legal assistance but the interests of justice so require, his right to examine or have examined witnesses against him and to obtain the attendance and examination of witnesses on his behalf under the same conditions as witnesses against him and his right to the free assistance of an interpreter and to the translation of the key documents. The analysis is based on the decisions of the European Court of Human Rights and focuses on the position taken by the French and the Greek Court of Cassation (Areopagus) on each one of the above mentioned rights
Lestrade, Éric. "Les principes directeurs du procès dans la jurisprudence du Conseil Constitutionnel". Thesis, Bordeaux 4, 2013. http://www.theses.fr/2013BOR40033/document.
Texto completoIn spite of a relatively low number of written dispositions dedicated to justice inside of the body of the Constitution of October 1958 4th, the constitutional Council, while updating this text through the Declaration of Human Rights, contributed to the development of a procedural constitutional law, which is structured around guiding principles. Those principles can be classified within three different categories : two major categories depend on the trial actor that is primarily concerned, either the judge or the parties; a third and additional category pertaining to procedural protections, fosters the essential qualities of the judge and secure the protection of the parties’ rights. A gradation of the requirements of the constitutional Council is discreetly perceptible between the first two categories of principles, and more easily identifiable between those first two categories and the last one. This decreasing scale of “density” yoked to the trial guiding principles highlights a genuine judicial policy when it comes to procedural constitutional law, emphasizing access to the judge, whom is given essential qualities in order to achieve its judicial duty. However, the action of the French constitutional judge, as satisfactory as it is towards the rights of the trial, would easily support the intervention of the constituent power in order to update Justice’s constitutional status
Ciravegna, Gabriele. "On the Two-fold Role of Logic Constraints in Deep Learning". Doctoral thesis, 2022. http://hdl.handle.net/2158/1264916.
Texto completoМалахова, Ольга Валентинівна, Ольга Валентиновна Малахова y Olga V. Malakhova. "Реалізація інституту сприяння захисту у кримінально- процесуальному доказуванні". Thesis, 2016. http://hdl.handle.net/11300/5956.
Texto completoДисертація на здобуття наукового ступеня кандидата юридичних наук за спеціальністю 12.00.09 - кримінальний процес та криміналістика; судова експертиза; оперативно-розшукова діяльність. - Національний університет «Одеська юридична академія», Одеса, 2016. Дисертація є першим у вітчизняній науці спеціальним комплексним дослідженням реалізації інституту сприяння захисту у кримінально- процесуальному доказуванні відповідно до чинного кримінального процесуального законодавства України. У дисертації проаналізовано доктринальний розвиток теорії favor defensionis, з’ясовано суть та зміст favor defensionis як інституту кримінального процесуального права, визначено значення сприяння захисту у кримінально- процесуальному доказуванні, з’ясована правова природа матеріалів, одержаних стороною захисту під час кримінального провадження. Охарактеризовано процесуальні можливості сторони захисту щодо самостійного збирання доказів під час досудового розслідування. Розкрито процес збирання доказів під час досудового розслідування сторонами кримінального провадження з урахуванням функціонування інституту сприяння захисту. Проаналізовано правовий порядок дослідження доказів під час судового розгляду у суді першої інстанції в контексті сприяння захисту. З’ясовано межі активності суду в кримінально-процесуальному доказуванні з урахуванням змагальності судового розгляду. Сформульовано науково-обґрунтовані пропозиції щодо внесення змін та доповнень до КПК України у контексті реалізації інституту сприяння захисту у кримінально-процесуальному доказуванні.
Диссертация на соискание научной степени кандидата юридических наук по специальности 12.00.09 - уголовный процесс и криминалистика; судебная экспертиза; оперативно-розыскная деятельность. - Национальный университет «Одесская юридическая академия», Одесса, 2016. Диссертация является первым в отечественной науке специальным комплексным исследованием реализации института благоприятствования защите в уголовно-процессуальном доказывании согласно действующему уголовному процессуальному законодательству Украины. Рассмотрено доктринальное развитие теории favor defensionis. Определена сущность благоприятствования защите как института уголовного процессуального права. Под институтом благоприятствования защите понимается совокупность правовых норм, которые наделяют сторону защиты исключительными правами, устанавливают обязанности лиц, имеющих властные полномочия, совершать процессуальные действия в интересах защиты, с целью уравновешивания комплекса прав и возможностей сторон уголовного производства для отстаивания собственных утверждений перед судом и возражения доводов стороны обвинения. Установлено, что содержание института благоприятствования защите охватывает правовые нормы, устанавливающие: исключительные права стороны защиты; обязанности лиц, имеющих властные полномочия, совершать процессуальные действия в интересах стороны защиты; принципы уголовного производства, благоприятствующие защите. Охарактеризовано содержание института благоприятствования защите в соответствии с действующим УПК Украины. Установлено, что значение реализации института благоприятствования защите в уголовно-процессуальном доказывании заключается в расширении пределов активности подозреваемого (обвиняемого) и защитника в уголовнопроцессуальном доказывании, что является необходимым шагом для создания надлежащих условий отстаивания их правовых позиций перед судом на основе процессуального равенства сторон. Определен процессуальный порядок собирания доказательств стороной защиты во время досудебного расследования. Охарактеризован процесс собирания доказательств во время досудебного расследования сторонами уголовного производства с учетом функционирования института благоприятствования защите. Установлено, что реализация института благоприятствования защите в процессуальной деятельности стороны обвинения по собиранию доказательств во время досудебного расследования выражается в наделении подозреваемого исключительными правами. Исследован правовой порядок реализации исключительных прав подозреваемого во время досудебного расследования. Рассмотрен правовой порядок заявления и рассмотрения ходатайств стороны защиты, которые направлены на собирание и проверку доказательств, в контексте благоприятствования защите. Охарактеризован правовой порядок ознакомления стороны защиты с материалами досудебного расследования до его окончания (ст. 221 УПК Украины), а также в порядке открытия материалов другой стороне (ст. 290 УПК Украины). Рассмотрен порядок обжалования бездействия следователя, прокурора, которое состоит в не рассмотрении ходатайства об ознакомлении с материалами досудебного расследования до его окончания, а также постановления об отказе в удовлетворении ходатайства об ознакомлении с материалами досудебного расследования до его окончания. Определен правовой порядок исследования доказательств во время судебного разбирательства в суде первой инстанции в контексте благоприятствования защите. Охарактеризовано распределение бремени доказывания между сторонами уголовного производства в ходе судебного разбирательства. Определена возможность возложения на сторону защиты бремени доказывания отсутствия события уголовного правонарушения. Рассмотрен правовой порядок признания судом доказательства недопустимым. Определены условия применения концепции «асимметрии правил допустимости доказательств», которая должна применяться к оправдательным доказательствам, полученных стороной обвинения с нарушением процессуальной формы. Определены пределы активности суда в уголовно-процессуальном доказывании в контексте состязательности судебного разбирательства. Рассмотрена субсидиарная активность суда в уголовно-процессуальном доказывании как составная часть института благоприятствования защите.
Dissertation for the Candidate of Law Degree, specialty 12.00.09 - criminal process and criminalistics; forensic examination, operational-search activity. - National University «Odessa Law Academy», Odessa, 2016. The dissertation is the first special comprehensive research that is devoted to the implementation of favor defensionis in criminal procedure proving according to the current criminal procedural legislation of Ukraine. The concept of institute of defence promotion in criminal procedure proving, as a specific legal mechanism, the purpose of which is to ensure the procedural equality of parties to criminal proceedings, is developed. The essence and significance of favor defensionis, as an institution of the criminal procedure law, are determined. Its structure and content according to the current criminal procedural legislation of Ukraine are defined. Process of collecting and examining evidence during the pre-trial investigation and the court proceedings in the first instance is characterized taking into account the functioning of institute of defence promotion. The procedural opportunities of the defense of independent collection of evidence during pre-trial investigation are examined.
"Detecting Adversarial Examples by Measuring their Stress Response". Master's thesis, 2019. http://hdl.handle.net/2286/R.I.55594.
Texto completoDissertation/Thesis
Masters Thesis Computer Science 2019
Naseer, Muzammal. "Novel Concepts and Designs for Adversarial Attacks and Defenses". Phd thesis, 2021. http://hdl.handle.net/1885/258166.
Texto completoHuang, Chen-Wei y 黃辰瑋. "Defense mechanism against adversarial attacks using density-based representation of images". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/u239p4.
Texto completo國立政治大學
資訊科學系
107
Adversarial examples are slightly modified inputs that are devised to cause erroneous inference of deep learning models. Recently, many methods have been proposed to counter the attack of adversarial examples. However, new ways of generating attacks have also surfaced accordingly. Protection against the intervention of adversarial examples is a fundamental issue that needs to be addressed before wide adoption of deep learning based intelligent systems. In this research, we utilize the method known as input recharacterization to effectively remove the perturbations found in the adversarial examples in order to maintain the performance of the original model. Input recharacterization typically consists of two stages: a forward transform and a backward reconstruction. Our hope is that by going through the lossy two-way transformation, the purposely added 'noise' or 'perturbation' will become ineffective. In this work, we employ digital halftoning and inverse halftoning for input recharacterization, although there exist many possible choices. We apply convolution layer visualization to better understand the network architecture and characteristics. The data set used in this study is Tiny ImageNet, consisting of 260 thousand 128x128 grayscale images belonging to 200 classes. Most of defense mechanisms rely on gradient masking, input transform and adversarial training. Among these strategies, adversarial training is widely regarded as the most effective. However, it requires adversarial examples to be generated and included in the training set, which is impractical in most applications. The proposed approach is more similar to input transform. We convert the image from intensity-based representation to density-based representation using halftone operation, which hopefully invalidates the attack by changing the image representation. We also investigate whether inverse halftoning can eliminate the adversarial perturbation. The proposed method does not require extra training of adversarial samples. Only low-cost input pre-processing is needed. On the VGG-16 architecture, the top-5 accuracy for the grayscale model is 76.5%, the top-5 accuracy for halftone model is 80.4%, and the top-5 accuracy for the hybrid model (trained with both grayscale and halftone images) is 85.14%. With adversarial attacks generated using FGSM, I-FGSM, and PGD, the top-5 accuracy of the hybrid model can still maintain 80.97%, 78.77%, 81.56%, respectively. Although the accuracy has been affected, the influence of adversarial examples is significantly discounted. The average improvement over existing input transform defense mechanisms is approximately 10%.
(11178210), Li-Chi Chang. "Defending against Adversarial Attacks in Speaker Verification Systems". Thesis, 2021.
Buscar texto completoWith the advance of the technologies of Internet of things, smart devices or virtual personal assistants at home, such as Google Assistant, Apple Siri, and Amazon Alexa, have been widely used to control and access different objects like door lock, blobs, air conditioner, and even bank accounts, which makes our life convenient. Because of its ease for operations, voice control becomes a main interface between users and these smart devices. To make voice control more secure, speaker verification systems have been researched to apply human voice as biometrics to accurately identify a legitimate user and avoid the illegal access. In recent studies, however, it has been shown that speaker verification systems are vulnerable to different security attacks such as replay, voice cloning, and adversarial attacks. Among all attacks, adversarial attacks are the most dangerous and very challenging to defend. Currently, there is no known method that can effectively defend against such an attack in speaker verification systems.
The goal of this project is to design and implement a defense system that is simple, light-weight, and effectively against adversarial attacks for speaker verification. To achieve this goal, we study the audio samples from adversarial attacks in both the time domain and the Mel spectrogram, and find that the generated adversarial audio is simply a clean illegal audio with small perturbations that are similar to white noises, but well-designed to fool speaker verification. Our intuition is that if these perturbations can be removed or modified, adversarial attacks can potentially loss the attacking ability. Therefore, we propose to add a plugin-function module to preprocess the input audio before it is fed into the verification system. As a first attempt, we study two opposite plugin functions: denoising that attempts to remove or reduce perturbations and noise-adding that adds small Gaussian noises to an input audio. We show through experiments that both methods can significantly degrade the performance of a state-of-the-art adversarial attack. Specifically, it is shown that denoising and noise-adding can reduce the targeted attack success rate of the attack from 100% to only 56% and 5.2%, respectively. Moreover, noise-adding can slow down the attack 25 times in speed and has a minor effect on the normal operations of a speaker verification system. Therefore, we believe that noise-adding can be applied to any speaker verification system against adversarial attacks. To the best of our knowledge, this is the first attempt in applying the noise-adding method to defend against adversarial attacks in speaker verification systems.
Lu, Yi-Wei y 呂逸瑋. "Conditional Generative Adversarial Network for Defect Classification with Class Imbalance". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/gku365.
Texto completo元智大學
資訊管理學系
107
Automated Optical Inspection (AOI) is used for defect inspection during industrial manufacturing process. It uses optical instrument to snap the surface of products and identify defects through technique of machine vision processing. Deep learning and convolution neural network automatically produce the feature which are useful for identify the defect correctly. However, the class imbalance for number of defect samples and normal samples is typically in industrial process, which will lead to poor accuracy of deep learning model. This paper proposed a framework named CGANC, integrates a Conditional Generative Adversarial Network (GAN), which can generate synthetic image automatically, to generate more defect images to adjust the data distribution for class imbalance. Eventually, this paper uses Convolutional Neural Network to get better result of defect data classification with manipulated data than with original data.
SUN, KUO-YU y 孫國育. "Pills Defect Detection Based on Generative Adversarial Networks and Automatic Optical Inspection". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/4faumu.
Texto completo國立臺灣科技大學
機械工程系
107
In Taiwan, pharmaceutical industries generally inspect surface of tablets for defects manually. This will result in not only time-consuming but also undesirable misjudgments. In recent years, due to the fast development of deep learning, Neural Network has been applied to more and more fields. In order to train the Convolutional Neural Networks for the usage of defects detection, a large number of defective samples have to be provided. However, it is very difficult to collect enough defective samples, and it also takes enormous amount of time to mark the defects manually. This research makes use of Generative Adversarial Network(GAN) to train the neural network model by only providing images of normal tablets. At the same time, Wasserstein Generative Adversarial Network(WGAN) and Autoencoder are used to rebuild a GAN for image reconstruction, comparing the image before and after reconstruction to detect the defects. Because of GAN fails to detect small defect area, this research also implements traditional optical inspection techniques to inspect the defect of black spots. A series of experiments proves that the algorithms developed in this thesis is able to give high defect inspection rate.
"Image-based Process Monitoring via Generative Adversarial Autoencoder with Applications to Rolling Defect Detection". Master's thesis, 2019. http://hdl.handle.net/2286/R.I.53733.
Texto completoDissertation/Thesis
Masters Thesis Industrial Engineering 2019
YANG, HAO-XIANG y 楊皓翔. "Surface Defect Detection of Scarce Samples Based on Deep Learning Model and Generative Adversarial Network". Thesis, 2019. http://ndltd.ncl.edu.tw/handle/evzn27.
Texto completo國立臺北科技大學
自動化科技研究所
107
In traditional automated optical inspection (AOI), the surface defect detection of different targets usually requires the specified detection algorithms and procedures from the field expertise. In order to solve this problem, this thesis used the deep learning model to train the surface defect and further used the data augmentation and generated adversarial network (GAN) to add more abundant training dataset. The sparse defect samples are always happened in surface defect detection. And then, the data augmentation through simple techniques, such as cropping, rotating, and flipping input images, are traditionally applied to expand the training dataset in order to improve the performance and ability of the model to generalize. However, these traditional techniques often induce the overfitting of the defect model. This thesis firstly obtained the rich and qualified defect images by active learning. The filtered defect images successively feed into the GAN to add more abundant training dataset. The Fréchet Inception Distance (FID) is further used to judge the difference between input and generated images. The images owned lowest FID will be stored as the training dataset of surface defect model. The dataset will efficiently decrease the overkill rate and missed detection rate of the corresponding well trained surface defect model. Finally, the surface detection of deep learning model will be verified through the public dataset and the captured images by the AOI instrument in real world. The experiment results show that the surface detection of deep learning model can get the equal detection accuracy and performance for both training with huge raw dataset and the expanded dataset with traditional data augmentation and GAN.
"The What, When, and How of Strategic Movement in Adversarial Settings: A Syncretic View of AI and Security". Doctoral diss., 2020. http://hdl.handle.net/2286/R.I.62910.
Texto completoDissertation/Thesis
Doctoral Dissertation Computer Science 2020
Rodrigues, Raquel Filipa Neto. "A alteração da qualificação jurídica no Processo Penal Português : o Art. 358º : uma análise crítica sobre o regime legal". Master's thesis, 2018. http://hdl.handle.net/10400.14/26494.
Texto completoThe alteration of the legal qualification in criminal procedure law is an issue that is not new and has been widely discussed in doctrine and jurisprudence. It is true that the legislative reforms that our Criminal Procedure Code has tried to address the difficulties that the jurists were pointing. However, this matter is far from peaceful and still raises doubts. The legal establishment of the principle of free legal qualification by the court has resolved the question that until then divided the doctrine, whether or not the court could change the legal qualification of the facts described in the accusation but raised new ones. Several of these have emerged as to how the rules relating to alteration of facts and / or alteration in the legal qualification should be interpreted. There are those who argue that the court can change the legal qualification, but that change is limited, in the penal provision, by the accusation so that the defendant is not jeopardized by this new qualification. Others argue that the principle of free qualification by the court is not limited (by the accusation), nor does it breach the defendant's guarantees of defence.