Littérature scientifique sur le sujet « Adversarial Defence »
Créez une référence correcte selon les styles APA, MLA, Chicago, Harvard et plusieurs autres
Sommaire
Consultez les listes thématiques d’articles de revues, de livres, de thèses, de rapports de conférences et d’autres sources académiques sur le sujet « Adversarial Defence ».
À côté de chaque source dans la liste de références il y a un bouton « Ajouter à la bibliographie ». Cliquez sur ce bouton, et nous générerons automatiquement la référence bibliographique pour la source choisie selon votre style de citation préféré : APA, MLA, Harvard, Vancouver, Chicago, etc.
Vous pouvez aussi télécharger le texte intégral de la publication scolaire au format pdf et consulter son résumé en ligne lorsque ces informations sont inclues dans les métadonnées.
Articles de revues sur le sujet "Adversarial Defence"
Jiang, Guoteng, Zhuang Qian, Qiu-Feng Wang, Yan Wei et Kaizhu Huang. « Adversarial Attack and Defence on Handwritten Chinese Character Recognition ». Journal of Physics : Conference Series 2278, no 1 (1 mai 2022) : 012023. http://dx.doi.org/10.1088/1742-6596/2278/1/012023.
Texte intégralHuang, Bo, Zhiwei Ke, Yi Wang, Wei Wang, Linlin Shen et Feng Liu. « Adversarial Defence by Diversified Simultaneous Training of Deep Ensembles ». Proceedings of the AAAI Conference on Artificial Intelligence 35, no 9 (18 mai 2021) : 7823–31. http://dx.doi.org/10.1609/aaai.v35i9.16955.
Texte intégralPawlicki, Marek, et Ryszard S. Choraś. « Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks ». Entropy 23, no 10 (3 octobre 2021) : 1304. http://dx.doi.org/10.3390/e23101304.
Texte intégralLal, Sheeba, Saeed Ur Rehman, Jamal Hussain Shah, Talha Meraj, Hafiz Tayyab Rauf, Robertas Damaševičius, Mazin Abed Mohammed et Karrar Hameed Abdulkareem. « Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition ». Sensors 21, no 11 (7 juin 2021) : 3922. http://dx.doi.org/10.3390/s21113922.
Texte intégralJohnston, Ed. « The adversarial defence lawyer : Myths, disclosure and efficiency—A contemporary analysis of the role in the era of the Criminal Procedure Rules ». International Journal of Evidence & ; Proof 24, no 1 (26 août 2019) : 35–58. http://dx.doi.org/10.1177/1365712719867972.
Texte intégralXu, Enhui, Xiaolin Zhang, Yongping Wang, Shuai Zhang, Lixin Lu et Li Xu. « WordRevert : Adversarial Examples Defence Method for Chinese Text Classification ». IEEE Access 10 (2022) : 28832–41. http://dx.doi.org/10.1109/access.2022.3157521.
Texte intégralBruce, Neil. « Defence expenditures by countries in allied and adversarial relationships ». Defence Economics 1, no 3 (mai 1990) : 179–95. http://dx.doi.org/10.1080/10430719008404661.
Texte intégralStriletska, Oksana. « Establishment and Development of the Adversarial Principle in the Criminal Process ». Path of Science 7, no 7 (31 juillet 2021) : 1010–16. http://dx.doi.org/10.22178/pos.72-2.
Texte intégralMacfarlane, Julie. « The Anglican Church’s sexual abuse defence playbook ». Theology 124, no 3 (mai 2021) : 182–89. http://dx.doi.org/10.1177/0040571x211008547.
Texte intégralZhang, Bowen, Benedetta Tondi, Xixiang Lv et Mauro Barni. « Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes ». Security and Communication Networks 2020 (12 novembre 2020) : 1–11. http://dx.doi.org/10.1155/2020/8882494.
Texte intégralThèses sur le sujet "Adversarial Defence"
Stiff, Harald. « Explainable AI as a Defence Mechanism for Adversarial Examples ». Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-260347.
Texte intégralDjupinlärning är den bästa metoden för bildklassificeringsuppgifter. Med dess introduktion kom många imponerande förbättringar inom datorseende som överträffade samtliga tidigare maskininlärningsmodeller. Samtidigt har det i kontrast till alla framgångar visat sig att djupa neuronnät lätt luras av motstridiga exempel, data som har modifierats för att få neurala nätverk att göra felaktiga klassificeringar. Denna nackdel har orsakat ett ökat tvivel gällande huruvida neuronnät är säkra att använda i praktiken. I detta examensarbete föreslås en ny försvarsmekanism mot motstridiga exempel som utnyttjar förklarbar AI för att filtrera bort motstridiga exempel innan de kommer i kontakt med modellerna. Vi utvärderar filtren mot olika attacker och modeller riktade till MNIST-, Fashion-MNIST-, och Cifar10-dataseten. Resultaten visar att filtren kan upptäcka motstridiga exempel konstruerade med vanliga attacker, men att de inte är robusta mot adaptiva attacker som specifikt utnyttjar försvarsmekanismens arkitektur.
Garcia, Dennis Alberto. « Peer-to-peer network modeling for adversarial proactive cyber defenses ». Thesis, Massachusetts Institute of Technology, 2017. http://hdl.handle.net/1721.1/112849.
Texte intégralThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Cataloged from student-submitted PDF version of thesis.
Includes bibliographical references (pages 49-50).
This thesis implements a novel peer-to-peer network simulator that integrates co-evolutionary algorithms in order to model adversarial attack and defense dynamics in networks. Modeling this behavior is desirable as it allows for network designers to better develop network defense strategies against adaptive cyber attackers. By developing a network simulator that implements a peer-to-peer protocol, we were able to control the environment and abstract away many of the complex details that would normally arise from using a live network. Because of this environment, we were able to design attack and defense models and grammars, construct arbitrary network topologies, and rapidly test adversarial behavior using the integrated coevolutionary algorithms. Second, the thesis implements the integration of the coevolutionary algorithms with a more complex, proprietary emulator that implements an advanced version of Chord. Our experiments with this system start to investigate the effectiveness of peer-to-peer networks as defenders as well as elucidate the issues of integrating coevolutionary algorithms in a real-world system.
by Dennis Alberto Garcia.
M. Eng.
Coulibaly, Ibrahima. « Les droits de la défense en droit mauritanien ». Thesis, Paris 8, 2018. http://www.theses.fr/2018PA080008.
Texte intégralUniversalism of the rights have come the concept the rights of the defenses diversity of procedural. A the level of each country, however big or small, whatever is its culture, he (It) is accepted and official that we cannot judge without referring to the fundamental rules (rulers), and without being attended by a lawyer. Rights of defence are guaranteed in Mauritanie by the law number 2007-036 carrying Code of criminal procedure, the law number 2007-012 carrying the judicial organization, the law number 99–035 carrying Code of civil procedure, commercial and administrative. The rules of rights of defence not wind not to be reached without the implementation of organs which frame the capacities of this one. The equality before the courts is expressly considered by fundamental law in the of the constitution owed July 20th, 1991. However, the principle is of no real reach in spite of the precision of the text. What seems absurd with our model of system of ineffective right, imply that the rules of the fair trial are not allocated in a egalitarian way to all. It is not the only difficulty or the ambiguity. The present study supports on one hand that the exercice of the equality of the contradictory and the equality of weapons guarantees the effectiveness of rights of defence, and on the other hand, that the development of the principles participates in a revival oo the rights.The contemporary position of rights of defence uses this notion demonstrating, often rights of defence as a superior implication and of a logical obvious fact of the procedure, thus obeying the fundamental criteria of the right to fair trial. He is determined by a whole series of procedures led in a trial and declares itself, today, under a set of legal bases protecting rights of defence. To this end we had tried to make a work of unpretentious sociological evaluation of perfect scientificity. Avoiding any legalism or positivism, the work stays nevertheless in legal dominance
Wood, Adrian Michael. « A defensive strategy for detecting targeted adversarial poisoning attacks in machine learning trained malware detection models ». Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2021. https://ro.ecu.edu.au/theses/2483.
Texte intégralKanerva, Anton, et Fredrik Helgesson. « On the Use of Model-Agnostic Interpretation Methods as Defense Against Adversarial Input Attacks on Tabular Data ». Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-20085.
Texte intégralKontext. Maskininlärning är ett område inom artificiell intelligens som är under konstant utveckling. Mängden domäner som vi sprider maskininlärningsmodeller i växer sig allt större och systemen sprider sig obemärkt nära inpå våra dagliga liv genom olika elektroniska enheter. Genom åren har mycket tid och arbete lagts på att öka dessa modellers prestanda vilket har överskuggat risken för sårbarheter i systemens kärna, den tränade modellen. En relativt ny attack, kallad "adversarial input attack", med målet att lura modellen till felaktiga beslutstaganden har nästan uteslutande forskats på inom bildigenkänning. Men, hotet som adversarial input-attacker utgör sträcker sig utom ramarna för bilddata till andra datadomäner som den tabulära domänen vilken är den vanligaste datadomänen inom industrin. Metoder för att tolka komplexa maskininlärningsmodeller kan hjälpa människor att förstå beteendet hos dessa komplexa maskininlärningssystem samt de beslut som de tar. Att förstå en modells beteende är en viktig komponent för att upptäcka, förstå och mitigera sårbarheter hos modellen. Syfte. Den här studien försöker reducera det forskningsgap som adversarial input-attacker och motsvarande försvarsmetoder i den tabulära domänen utgör. Målet med denna studie är att analysera hur modelloberoende tolkningsmetoder kan användas för att mitigera och detektera adversarial input-attacker mot tabulär data. Metod. Det uppsatta målet nås genom tre på varandra följande experiment där modelltolkningsmetoder analyseras, adversarial input-attacker utvärderas och visualiseras samt där en ny metod baserad på modelltolkning föreslås för detektion av adversarial input-attacker tillsammans med en ny mitigeringsteknik där feature selection används defensivt för att minska attackvektorns storlek. Resultat. Den föreslagna metoden för detektering av adversarial input-attacker visar state-of-the-art-resultat med över 86% träffsäkerhet. Den föreslagna mitigeringstekniken visades framgångsrik i att härda modellen mot adversarial input attacker genom att minska deras attackstyrka med 33% utan att degradera modellens klassifieringsprestanda. Slutsats. Denna studie bidrar med användbara metoder för detektering och mitigering av adversarial input-attacker såväl som metoder för att utvärdera och visualisera svårt förnimbara attacker mot tabulär data.
Branlat, Matthieu. « Challenges to Adversarial Interplay Under High Uncertainty : Staged-World Study of a Cyber Security Event ». The Ohio State University, 2011. http://rave.ohiolink.edu/etdc/view?acc_num=osu1316462733.
Texte intégralJobert, Sylvain. « La connaissance des actes du procès civil par les parties ». Thesis, Paris 2, 2016. http://www.theses.fr/2016PA020070.
Texte intégralIn civil law procedures, the parties’ knowledge of the acts of the trial is essential; it guarantees that certain principles, such as the adversarial principle, will be respected. However, a difficulty arises: it is hard to determine whether a party has in fact become aware of the act which was communicated to him. The question is to determine whether the law can accept such a difficulty. To this end, two divergent models can be provided. In the formalistic one, the choice is made to favor the knowledge of the acts of the trial beforehand, in order to be able to become disinterested in their actual knowledge afterwards, all the means having been implemented to carry this out. In the realistic one, the way in which the acts of the trial are brought to the parties' attention is neglected, but thereafter, there is a resurgent focus on the knowledge the parties have genuinely had. The study reveals that the law of civil trial was initially based on a predominantly formalistic model, but this model has evolved, especially during the last decade. Under the influence of contemporary concerns in order to rationalize justice costs and increase the protection of the parties' fundamental rights, the formalism of civil lawsuit has been tempered. Should it be even more moderate? This work neither pleads for the subversion of the classical model nor for its reinstatement. Instead, it is a nuanced evolution of the law which is suggested. It suggests to promote formalism when legal certainty requires it, without sacrificing the benefit of lightening the rules when it is necessary
Metenier, Julian. « La protection pénale de l'accusé ». Thesis, Aix-Marseille, 2014. http://www.theses.fr/2014AIXM1065.
Texte intégralThe theme of the criminal protection of the accused, well-known to criminal specialists, today deserves to be renewed under a probationary essentially angle, in the light of current developments in the criminal trial. Located at the confluence of innocence and guilt, the rights and guarantees granted to the accused understood in its conventional sense, must be analyzed in consideration of the founding principles of presumption of innocence and the rights of the defense. The continuing evolution of these two principles, in a sense diametrically opposite, inevitably reflects the intensity and the terms of the protection afforded any person suspected or prosecuted under criminal proceedings.This study deliberately limited to the pre-trial phase, proposes to understand, in a practical and technical problems, the various case law and legislative developments carried out in the field. Will thus addressed the key issues currently faced in criminal proceedings such as the question of the legal status of the suspect or the effectiveness of the adversarial principle in the preliminary criminal trial. While it may be tempting, at first, to conclude an indisputable strengthening the criminal protection afforded to the accused, then it will be necessary to reconsider this issue in terms of the study of procedural limitations attached to the criminal trial. Far from addressing this issue in a partisan way, it will be about moderation in the remarks. Indeed, perhaps more than any other issue of criminal procedure, it is imperative to keep a sense of proportion
Borges, Lélia Moreira. « Adolescente em conflito com a lei : uma análise do direito à ampla defesa em Goiânia/Goiás ». Universidade Federal de Goiás, 2017. http://repositorio.bc.ufg.br/tede/handle/tede/8806.
Texte intégralApproved for entry into archive by Luciana Ferreira (lucgeral@gmail.com) on 2018-08-17T11:20:43Z (GMT) No. of bitstreams: 2 Dissertação - Lélia Moreira Borges - 2017.pdf: 1967491 bytes, checksum: 0c533712e13300a3711e215ad48229a5 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5)
Made available in DSpace on 2018-08-17T11:20:43Z (GMT). No. of bitstreams: 2 Dissertação - Lélia Moreira Borges - 2017.pdf: 1967491 bytes, checksum: 0c533712e13300a3711e215ad48229a5 (MD5) license_rdf: 0 bytes, checksum: d41d8cd98f00b204e9800998ecf8427e (MD5) Previous issue date: 2017-08-31
Coordenação de Aperfeiçoamento de Pessoal de Nível Superior - CAPES
This dissertation had as its objective verify whether the adolescents submitted to the institutionalization measures in Goiânia, Goiás – Brazil, were guaranteed their right to the adversarial principle and full defense in their trials. The empirical field of this investigation consisted of the analysis of cases filed between the periods of 2014 to 2016, and the observation of hearings carried out in the infractions court of Child and Youth Court of Goiânia, GO and interviews with public defenders. The Federal Constitution of 1988, the Child and Adolescent Statute, Criminal Code, Criminal Procedure and Civil Procedure Codes were used as the main legal references for this study. As theoretical support, Emílio G. Mendez, Pierre Bourdieu and Loïc Wacquant were also used. These references were useful in the understanding of the infraction persecution dynamics operationalized by the security and justice system of the State. As well as that, the understanding of the socio-juridical paradigm in force at each moment of history that justified the penalization of children and adolescents; the concept of field as a social space in competition, subject to internal disputes hierarchically established by the monopoly of the significance of such space, and the intensification of punitive actions by the State allow the perception of the permanence of the irregular situation paradigm in the professionals’ performances and judicial decisions. Decisions marked by inequality between institutions that operate in the juvenile criminal justice system, facing the recent entry of the public defense counsel, not yet totally structured, in the game of signification and legitimation of a trial that is preponderantly inquisitive. It brings loss to the exercise of full defense of the adolescents accused of acts of infraction. Evidence of a mismatch is noticed between the advances in the children’s and adolescents’ acquisition of rights and guarantees and the criminal control operationalized by the juvenile criminal justice system of Goiânia / GO.
Essa dissertação teve como objetivo verificar se os adolescentes submetidos à medida de internação em Goiânia/Goiás tiveram garantidos o direito ao contraditório e a ampla defesa nos seus julgamentos. O campo empírico desta investigação consistiu na análise de processos arquivados entre os períodos de 2014 a 2016, da observação de audiências realizadas na vara de atos infracionais do Juizado da Infância e Juventude de Goiânia/GO e de entrevistas aos defensores públicos. A Constituição Federal de 1988, Estatuto da Criança e do Adolescente, Códigos Penal, de Processo Penal e de Processo Civil foram referência para este estudo. Como suportes teóricos foram utilizados, entre outros, Emílio G. Mendez, Pierre Bourdieu e Loïc Wacquant. Esses referenciais serviram de suporte para entender os diferentes paradigmas jurídicos que justificaram a aplicação de penalização de crianças e adolescentes no decorrer da história apresentados por Mendez: nas considerações para uma sociologia do campo jurídico deixadas por Pierre Bourdieu sobre a força do direito, enquanto instrumento de poder da reprodução social e, nas discussões apresentas por Wacquant acerca do controle social e do estado punitivo. Permitindo assim, perceber a permanência do paradigma da situação irregular na atuação dos profissionais e nas decisões judiciais; a desigualdade entre instituições que atuam no sistema de justiça penal juvenil, dada a recente entrada da Defensoria Pública ainda não totalmente estruturada, no jogo da significação e legitimação de um julgamento preponderantemente inquisitivo, ocasionando com isso, prejuízo ao exercício pleno da defesa dos(as) adolescentes acusados(as) de atos infracionais. Evidenciando um descompasso entre os avanços na conquista de direitos e garantias das crianças e adolescentes e o controle social operacionalizado pelo sistema de justiça penal juvenil de Goiânia/GO.
Nga, Essomba Tergalise. « La protection des droits de l'accusé devant la cour pénale internationale ». Thesis, Lyon 3, 2011. http://www.theses.fr/2011LYO30005.
Texte intégralProtecting the rights of the accused depends in any legal debate on respect for a fair trial. In doing so, the creation of the ICC merits special attention by virtue not only of its being permanent and universal, but also the extent of international crimes with which it deals. As a result of this broad scope, research suggests any protective coverage is relative in its effectiveness and utopian, despite the requirement of compatibility of the law applicable to internationally recognized human rights. The apparent respect for these rights, the principle of due process and the requirement of the presence of the accused at his or her trial do not guarantee an effective equality of arms, the exercise of one’s rights or respect for the presumption of innocence. Instead, the procedural rule of imbalance, the excessive length of trials and the continued detention of the accused have led to objections about effectively protecting the rights of the accused. So-called protection gives way instead to the fight against impunity, the reticence of victims and witnesses and the sovereignty of States. Following this study, it is necessary to rebalance the rights of the parties and rethink the jurisdiction of the Court
Livres sur le sujet "Adversarial Defence"
Jajodia, Sushil, George Cybenko, Peng Liu, Cliff Wang et Michael Wellman, dir. Adversarial and Uncertain Reasoning for Adaptive Cyber Defense. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30719-6.
Texte intégralHausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2014.
Trouver le texte intégralHausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2012.
Trouver le texte intégralHausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2014.
Trouver le texte intégralHausman, David. Securities law in the adversarial setting. Toronto] : Faculty of Law, University of Toronto, 2013.
Trouver le texte intégralRose, Clive. Campaigns against western defence : NATO's adversaries and critics. 2e éd. Basingstoke : Macmillan, 1986.
Trouver le texte intégralRose, Clive. Campaigns against western defence : NATO's adversaries and critics. New York : St. Martin's Press, 1985.
Trouver le texte intégralCampaigns against Western defence : NATO's adversaries and critics. Basingstoke : Macmillan, 1985.
Trouver le texte intégralRose, Clive. Campaigns against Western defence : NATO's adversaries and critics. Basingstoke : Macmillan, 1985.
Trouver le texte intégralCampaigns against western defence : NATO's adversaries and critics. 2e éd. Houndmills, Basingstoke, Hampshire : Macmillan, 1986.
Trouver le texte intégralChapitres de livres sur le sujet "Adversarial Defence"
Zheng, Yanbin, Hongxu Yun, Fu Wang, Yong Ding, Yongzhong Huang et Wenfen Liu. « Defence Against Adversarial Attacks Using Clustering Algorithm ». Dans Communications in Computer and Information Science, 323–33. Singapore : Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-15-0118-0_25.
Texte intégralKamath, Aayush, Vrinda Bhatu, Tejas Paranjape et Rupali Sawant. « Malware Classification and Defence Against Adversarial Attacks ». Dans Proceedings of Data Analytics and Management, 267–74. Singapore : Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-16-6285-0_22.
Texte intégralGittings, T., S. Schneider et J. Collomosse. « Vax-a-Net : Training-Time Defence Against Adversarial Patch Attacks ». Dans Computer Vision – ACCV 2020, 235–51. Cham : Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-69538-5_15.
Texte intégralTaran, Olga, Shideh Rezaeifar et Slava Voloshynovskiy. « Bridging Machine Learning and Cryptography in Defence Against Adversarial Attacks ». Dans Lecture Notes in Computer Science, 267–79. Cham : Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-11012-3_23.
Texte intégralZhou, Jiahui, Nayyar Zaidi, Yishuo Zhang et Gang Li. « Discretization Inspired Defence Algorithm Against Adversarial Attacks on Tabular Data ». Dans Advances in Knowledge Discovery and Data Mining, 367–79. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-05936-0_29.
Texte intégralRose, Clive. « Adversaries and Critics ». Dans Campaigns Against Western Defence, 3–18. London : Palgrave Macmillan UK, 1985. http://dx.doi.org/10.1007/978-1-349-07526-3_1.
Texte intégralRose, Clive. « Adversaries and Critics ». Dans Campaigns Against Western Defence, 3–18. London : Palgrave Macmillan UK, 1986. http://dx.doi.org/10.1007/978-1-349-18523-8_1.
Texte intégralShao, Rui, Pramuditha Perera, Pong C. Yuen et Vishal M. Patel. « Open-Set Adversarial Defense ». Dans Computer Vision – ECCV 2020, 682–98. Cham : Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58520-4_40.
Texte intégralKuribayashi, Minoru. « Defense Against Adversarial Attacks ». Dans Frontiers in Fake Media Generation and Detection, 131–48. Singapore : Springer Nature Singapore, 2022. http://dx.doi.org/10.1007/978-981-19-1524-6_6.
Texte intégralXu, Ying, Kiran Raja, Raghavendra Ramachandra et Christoph Busch. « Adversarial Attacks on Face Recognition Systems ». Dans Handbook of Digital Face Manipulation and Detection, 139–61. Cham : Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-030-87664-7_7.
Texte intégralActes de conférences sur le sujet "Adversarial Defence"
Oneto, Luca, Sandro Ridella et Davide Anguita. « The Benefits of Adversarial Defence in Generalisation ». Dans ESANN 2021 - European Symposium on Artificial Neural Networks, Computational Intelligence and Machine Learning. Louvain-la-Neuve (Belgium) : Ciaco - i6doc.com, 2021. http://dx.doi.org/10.14428/esann/2021.es2021-28.
Texte intégralXu, Ying, Xu Zhong, Antonio Jimeno Yepes et Jey Han Lau. « Grey-box Adversarial Attack And Defence For Sentiment Classification ». Dans Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics : Human Language Technologies. Stroudsburg, PA, USA : Association for Computational Linguistics, 2021. http://dx.doi.org/10.18653/v1/2021.naacl-main.321.
Texte intégralXu, Tongyang, et Zhongxiang Wei. « Waveform Defence Against Deep Learning Generative Adversarial Network Attacks ». Dans 2022 13th International Symposium on Communication Systems, Networks and Digital Signal Processing (CSNDSP). IEEE, 2022. http://dx.doi.org/10.1109/csndsp54353.2022.9907905.
Texte intégralCouturier, Antonin, et Anton-David Almasan. « Semi-supervised Domain Adaptation via adversarial training ». Dans 2021 Sensor Signal Processing for Defence Conference (SSPD). IEEE, 2021. http://dx.doi.org/10.1109/sspd51364.2021.9541427.
Texte intégralGouk, Henry, et Timothy M. Hospedales. « Optimising Network Architectures for Provable Adversarial Robustness ». Dans 2020 Sensor Signal Processing for Defence Conference (SSPD). IEEE, 2020. http://dx.doi.org/10.1109/sspd47486.2020.9272169.
Texte intégralZoto, Erjon, Stewart Kowalski, Christopher Frantz, Basel Katt et Edgar Lopez-Rojas. « CyberAIMs : a tool for teaching adversarial and systems thinking ». Dans The 8th International Defence and Homeland Security Simulation Workshop. CAL-TEK srl, 2018. http://dx.doi.org/10.46354/i3m.2018.dhss.004.
Texte intégralTan, Wei, Jiajia Zhao, Xinkai Liang, Hanchen Lu, Baogang Song et Hao Guan. « Adversarial Example Attack and Defence of Object Recognition : A Survey ». Dans 2022 IEEE International Conference on Unmanned Systems (ICUS). IEEE, 2022. http://dx.doi.org/10.1109/icus55513.2022.9986597.
Texte intégralMakridis, Georgios, Spyros Theodoropoulos, Dimitrios Dardanis, Ioannis Makridis, Maria Margarita Separdani, Georgios Fatouros, Dimosthenis Kyriazis et Panagiotis Koulouris. « XAI enhancing cyber defence against adversarial attacks in industrial applications ». Dans 2022 IEEE 5th International Conference on Image Processing Applications and Systems (IPAS). IEEE, 2022. http://dx.doi.org/10.1109/ipas55744.2022.10052858.
Texte intégralNakane, Ikuko. « Accusation, defence and morality in Japanese trials : A Hybrid Orientation to Criminal Justice ». Dans GLOCAL Conference on Asian Linguistic Anthropology 2019. The GLOCAL Unit, SOAS University of London, 2019. http://dx.doi.org/10.47298/cala2019.16-5.
Texte intégralHan, Yi, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan et Sarah Erfani. « Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence ». Dans 2020 International Joint Conference on Neural Networks (IJCNN). IEEE, 2020. http://dx.doi.org/10.1109/ijcnn48605.2020.9206634.
Texte intégralRapports d'organisations sur le sujet "Adversarial Defence"
Allan, Duncan, et Ian Bond. A new Russia policy for post-Brexit Britain. Royal Institute of International Affairs, janvier 2022. http://dx.doi.org/10.55317/9781784132842.
Texte intégralCollazo, Hector III L. Defending Against Opposed Patterns of Resistant : Can Past Cultural Lessons in Armed Conflict Help U.S. Identify, Defend, Adapt, or Exploit Notions of Resistant With New Adversaries Like ISIS. Fort Belvoir, VA : Defense Technical Information Center, mai 2015. http://dx.doi.org/10.21236/ad1012800.
Texte intégral