Search

Your search keyword '"Adversarial"' showing total 153 results

Search Constraints

Start Over You searched for: Descriptor "Adversarial" Remove constraint Descriptor: "Adversarial" Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed
153 results on '"Adversarial"'

Search Results

1. Is wearing these sunglasses an attack? Obligations under IHL related to anti-AI countermeasures.

3. Enhancing the fairness of offensive memes detection models by mitigating unintended political bias.

4. COLLECTION OF EVIDENCE BY THE DEFENSE IN UKRAINIAN CRIMINAL JUSTICE: AN ATTEMPT TO ACHIEVE EQUALITY OF ARMS.

5. INVESTIGATING JUDGE UNDER THE FRENCH CODE OF CRIMINAL PROCEDURE

7. إنهاء الخصومة الإدارية عن طريق سحب القرار الإداري

8. THE IMPACT OF THE PRESUMPTION OF INNOCENCE ON THE DISTRIBUTION OF THE BURDEN OF PROOF IN THE CRIMINAL PROCEEDINGS.

10. Dynamics of optimal harvesting in an Ammensal-Adversarial interaction

11. Face Database Protection via Beautification with Chaotic Systems.

12. GANs for Medical Image Synthesis: An Empirical Study.

13. Western strategy's two logics: Diverging interpretations.

14. A Review of Defence Pretrial Disclosures Within the Case Management Theory of Criminal Proceedings in Ghana

15. Realization of a fair trial in quasi-judicial authorities (Dispute Resolution Council)

16. AMAE: Adversarial multimodal auto-encoder for crisis-related tweet analysis.

17. Conditional Generative Adversarial Network Approach for Autism Prediction.

18. Semi-Supervised Learning of MRI Synthesis Without Fully-Sampled Ground Truths.

19. Dynamics of optimal harvesting in an Ammensal-Adversarial interaction.

20. An intelligent system for craniomaxillofacial defecting reconstruction.

21. Hypothetical Visible Bands of Advanced Meteorological Imager Onboard the Geostationary Korea Multi-Purpose Satellite -2A Using Data-To-Data Translation

22. ResViT: Residual Vision Transformers for Multimodal Medical Image Synthesis.

23. Deep Learning for Simultaneous Inference of Hydraulic and Transport Properties.

24. 'Equality of arms' in criminal procedure in the context of the right to a fair trial

25. Unsupervised MRI Reconstruction via Zero-Shot Learned Adversarial Transformers.

26. Crafting Adversarial Perturbations via Transformed Image Component Swapping.

27. Intelligent networking in adversarial environment: challenges and opportunities.

28. Learning time-aware features for action quality assessment.

29. Optimal Transport-Based Distributionally Robust Optimization: Structural Properties and Iterative Schemes.

30. Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT

31. Investigating strategies towards adversarially robust time series classification.

32. Journalists' Adversarial Questions in Iran and the United States Political Interviews

33. Court Activity in the Process of Evidence in the Conditions of Compatibility in Civil Court-Production

34. Achieving Fairness with Decision Trees: An Adversarial Approach

35. Face Database Protection via Beautification with Chaotic Systems

36. Contradictorialitatea în faza de urmărire penală. Asistarea avocatului la efectuarea actelor de urmărire penală.

37. Explicit feature disentanglement for visual place recognition across appearance changes.

38. Improving Cross-Corpus Speech Emotion Recognition with Adversarial Discriminative Domain Generalization (ADDoG).

39. SPLASH: Learnable activation functions for improving accuracy and adversarial robustness.

40. Domain distribution variation learning via adversarial adaption for helicopter transmission system fault diagnosis.

41. El principio de igualdad de armas: un análisis conceptual

42. Privacy-Net: An Adversarial Approach for Identity-Obfuscated Segmentation of Medical Images.

43. An Adversarial Smart Contract Honeypot in Ethereum.

44. The principle of adversarial proceedings in preparatory criminal proceedings.

45. Stopping the course of the judicial litigation and dropping it, a study in the Jordanian Civil Procedures Law.

46. Learning credible DNNs via incorporating prior knowledge and model local explanation.

47. Tsallis-INF: An Optimal Algorithm for Stochastic and Adversarial Bandits.

48. Person re-identification from virtuality to reality via modality invariant adversarial mechanism.

49. X-ModalNet: A semi-supervised deep cross-modal network for classification of remote sensing data.

50. Multi-Task Consistency-Preserving Adversarial Hashing for Cross-Modal Retrieval.

Catalog

Books, media, physical & digital resources