Search

Your search keyword '"Adversarial"' showing total 197 results

Search Constraints

Start Over You searched for: Descriptor "Adversarial" Remove constraint Descriptor: "Adversarial" Search Limiters Full Text Remove constraint Search Limiters: Full Text
197 results on '"Adversarial"'

Search Results

1. Is wearing these sunglasses an attack? Obligations under IHL related to anti-AI countermeasures.

3. Enhancing the fairness of offensive memes detection models by mitigating unintended political bias.

4. COLLECTION OF EVIDENCE BY THE DEFENSE IN UKRAINIAN CRIMINAL JUSTICE: AN ATTEMPT TO ACHIEVE EQUALITY OF ARMS.

5. INVESTIGATING JUDGE UNDER THE FRENCH CODE OF CRIMINAL PROCEDURE

6. Adversarial Privacy Auditing of Synthetically Generated Data produced by Large Language Models using the TAPAS Toolbox

7. Dynamics of optimal harvesting in an Ammensal-Adversarial interaction

8. Face Database Protection via Beautification with Chaotic Systems.

9. GANs for Medical Image Synthesis: An Empirical Study.

10. A Review of Defence Pretrial Disclosures Within the Case Management Theory of Criminal Proceedings in Ghana

11. Realization of a fair trial in quasi-judicial authorities (Dispute Resolution Council)

12. Conditional Generative Adversarial Network Approach for Autism Prediction.

13. Semi-Supervised Learning of MRI Synthesis Without Fully-Sampled Ground Truths.

14. Dynamics of optimal harvesting in an Ammensal-Adversarial interaction.

15. Hypothetical Visible Bands of Advanced Meteorological Imager Onboard the Geostationary Korea Multi-Purpose Satellite -2A Using Data-To-Data Translation

16. ResViT: Residual Vision Transformers for Multimodal Medical Image Synthesis.

17. 'Equality of arms' in criminal procedure in the context of the right to a fair trial

18. Unsupervised MRI Reconstruction via Zero-Shot Learned Adversarial Transformers.

19. Crafting Adversarial Perturbations via Transformed Image Component Swapping.

20. Optimal Transport-Based Distributionally Robust Optimization: Structural Properties and Iterative Schemes.

21. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

22. Journalists' Adversarial Questions in Iran and the United States Political Interviews

23. Court Activity in the Process of Evidence in the Conditions of Compatibility in Civil Court-Production

24. Achieving Fairness with Decision Trees: An Adversarial Approach

25. Face Database Protection via Beautification with Chaotic Systems

26. Overcoming Long-Term Catastrophic Forgetting Through Adversarial Neural Pruning and Synaptic Consolidation.

27. Explicit feature disentanglement for visual place recognition across appearance changes.

28. Multi-Dimensional Disentangled Representation Learning for Emotion Embedding Generation

29. Adversarial Attacks and Defense using Energy-Based Image Models

30. El principio de igualdad de armas: un análisis conceptual

31. Privacy-Net: An Adversarial Approach for Identity-Obfuscated Segmentation of Medical Images.

32. Stopping the course of the judicial litigation and dropping it, a study in the Jordanian Civil Procedures Law.

33. BBAS: Towards large scale effective ensemble adversarial attacks against deep neural network learning.

34. Tsallis-INF: An Optimal Algorithm for Stochastic and Adversarial Bandits.

35. Multi-Task Consistency-Preserving Adversarial Hashing for Cross-Modal Retrieval.

36. Achieving Fairness with Decision Trees: An Adversarial Approach.

37. Masked Linear Regression for Learning Local Receptive Fields for Facial Expression Synthesis.

38. Semi-Supervised Learning of MRI Synthesis Without Fully-Sampled Ground Truths

39. A Systematic Approach for Evaluating Artificial Intelligence Models in Industrial Settings

40. Aproximaciones legales y jurisprudenciales a la prueba de oficio, en el procedimiento penal adversarial con tendencia acusatoria en el ordenamiento colombiano

41. REMOVING THE MASK: VIDEO FINGERPRINTING ATTACKS OVER TOR

42. DEEP DETECTOR HEALTH MANAGEMENT UNDER ADVERSARIAL CAMPAIGNS

43. THE ADVERSARIAL VS INQUISITORIAL DICHOTOMY IN INTERNATIONAL CRIMINAL LAW: A REDUNDANT CONVERSATION

44. Security Through Stochasticity - Toward Adversarial Defense using Energy-based Models

45. EL SERVICIO DE JUSTICIA PENAL SANTAFESINO: PRODUCCIÓN DE AUDIENCIAS ORALES, MARCO JURÍDICO Y ORGANIZACIÓN: EL CASO DE LA OFICINA DE GESTIÓN JUDICIAL DE LOS DISTRITOS JUDICIALES N° 1 Y 2.

46. EL PRINCIPIO DE IGUALDAD DE ARMAS: UN ANÁLISIS CONCEPTUAL.

47. THE PLEA AGREEMENT -- A NEW WAY OF NEGOTIATED JUSTICE IN THE EUROPEAN JUDICIARIES.

48. Detecting and Mitigating Adversarial Perturbations for Robust Face Recognition.

49. SynSeg-Net: Synthetic Segmentation Without Target Modality Ground Truth.

50. Unsupervised MRI Reconstruction via Zero-Shot Learned Adversarial Transformers

Catalog

Books, media, physical & digital resources