Datasets, clues and state-of-the-arts for multimedia forensics: An extensive review
With the large chunks of social media data being created daily and the parallel rise of
realistic multimedia tampering methods, detecting and localising tampering in images and …
realistic multimedia tampering methods, detecting and localising tampering in images and …
[HTML][HTML] A hybrid approach for adversarial attack detection based on sentiment analysis model using Machine learning
One of the main subfields of Machine Learning (ML) that deals with human language for
intelligent applications is Natural Language Processing (NLP). One of the biggest problems …
intelligent applications is Natural Language Processing (NLP). One of the biggest problems …
Cross-domain facial expression recognition based on adversarial attack fine-tuning learning
Y Zhang, Z Sun - Engineering Applications of Artificial Intelligence, 2024 - Elsevier
Expression recognition is important in artificial intelligence research and has broad
application prospects in medical care and transportation. However, owing to differences in …
application prospects in medical care and transportation. However, owing to differences in …
Inflect-text: a novel mechanism to evade neural text classifiers by leveraging word inflectional perturbations
Advanced neural text classifiers have shown remarkable ability in the task of classification.
The investigation illustrates that text classification models have an inherent vulnerability to …
The investigation illustrates that text classification models have an inherent vulnerability to …
Don't be a Fool: Pooling Strategies in Offensive Language Detection from User-Intended Adversarial Attacks
Offensive language detection is an important task for filtering out abusive expressions and
improving online user experiences. However, malicious users often attempt to avoid filtering …
improving online user experiences. However, malicious users often attempt to avoid filtering …
Deceiving Deep Learning-based Fraud SMS Detection Models through Adversarial Attacks
Short Messaging Service (SMS) is one of the most extensively utilized mobile applications
for communication around the world. Smishing is the technique of delivering harmful SMS to …
for communication around the world. Smishing is the technique of delivering harmful SMS to …
ARG-Net: Adversarial Robust Generalized Network to Defend Against Word-Level Textual Adversarial Attacks
Natural Language Processing models have strong performance across various applications,
although they are susceptible to manipulation by adversarial instances. A minor disturbance …
although they are susceptible to manipulation by adversarial instances. A minor disturbance …
BEACOMP: A Novel Textual Adversarial Attack Architecture for Unveiling the Fragility of Neural Text Classifiers
Natural Language Processing models are now being used more than ever before and they
have been quite remarkable in applications like sentiment classification, text generation …
have been quite remarkable in applications like sentiment classification, text generation …
IRIS: Intelligent Responsive Interface Solution, a promising Desktop Assistant for Differently-Abled
A Karkra, R Singh… - 2024 2nd International …, 2024 - ieeexplore.ieee.org
In a quickly progressing digital world, the arrival of virtual assistants has become a
revolutionary principle for human-computer interactions. In this research project, an AI …
revolutionary principle for human-computer interactions. In this research project, an AI …
[PDF][PDF] REVOLUTIONIZING COTTON FARMING: CO-CNN INTEGRATION FOR DISEASE IDENTIFICATION AND YIELD PREDICTION
S GOVINDASAMY, D JAYARAJ - Journal of Theoretical and Applied …, 2024 - jatit.org
In agriculture, accurate identification of cotton plant diseases and prediction of yield are
crucial for ensuring crop health and optimizing production. This abstract explores the …
crucial for ensuring crop health and optimizing production. This abstract explores the …