Showing 3,641 - 3,648 results of 3,648 for search '"Attacker"', query time: 0.06s Refine Results
  1. 3641
  2. 3642

    BDC-DAL: A new algorithm using blueprint difference convolution and dual auxiliary supervision for lightweight face anti-spoofing(BDC-DAL:基于蓝图差分卷积和双重辅助监督的轻量化人脸活体检测算法)... by 叶继华(YE Jihua), 梁芳昕(LIANG Fangxin), 王超(WANG Chao), 肖顺杰(XIAO Shunjie), 宗义(ZONG Yi), 江爱文(JIANG Aiwen)

    Published 2025-01-01
    “…In addition, the introduced dual auxiliary supervision mechanism utilizes the reconstruction process of supervised signals to learn subtle spoof clues, which significantly improves the robustness of the model to unknown attack scenarios. To validate the effectiveness of the proposed method, this study conducts extensive tests on OULU-NPU and CelebA-Spoof, two recognized face anti-spoofing datasets. …”
    Get full text
    Article
  3. 3643

    Voltaire et Contant d’Orville: le 'Voltaire portatif' (1766), une lettre inconnue, un remerciement à l’auteur, et une réplique voilée à l’archevêque d’Auch by John R. Iverson

    Published 2024-11-01
    “…Subsequently, the essay analyses Voltaire’s response to Contant d’Orville, first as a typical example of the numerous letters the philosophe wrote to thank younger writers who had sent their works to him, and then as a carefully crafted attack against the archbishop of Auch who had explicitly targeted Voltaire in a pastoral letter dating from 1764. …”
    Get full text
    Article
  4. 3644

    Mettre en question le grapho-phonocentrisme: la langue des signes au dix-huitième siècle by Edward Nye

    Published 2024-11-01
    “…To tackle this subject, we turn to Diderot, Graffigny and Rétif de La Bretonne, whom we consider in the light of the ideas of the most important eighteenth-century teacher of deaf people, the abbé de L’Épée. L’Épée, explicitly attacking the dogma that voice or writing are the sole legitimate vectors of language, declares that sign language can be entirely visual, and that it does not need to be physically articulated or written. …”
    Get full text
    Article
  5. 3645

    Is it Time to Recognize Political Anxiety as a Social Determinant of Health? by Brandon Ambrosino

    Published 2024-12-01
    “…So, even though you might be sitting down with your family to watch an anodyne program like Jeopardy, you’ll likely see some sort of “attack ad” — the very name of which tells you that it’s been created to foster hostility.  …”
    Get full text
    Article
  6. 3646

    Designing a cyber insurance implementation model using foundational data theory by Behzad Esmaeilifar, manouchehr Ansari

    Published 2024-05-01
    “…The risks caused by cyber-attacks and the care of data and privacy of people caused managers to consider themselves responsible for not properly monitoring the company (Uuganbayar et al, 2020). …”
    Get full text
    Article
  7. 3647

    A Model for Implementing New FinTechs in the Banking Industry (Peer-to-Peer Lending) by Hosein Mohammadi, Narges Mohammadalipour, Noroz Norollahzadeh, Ghanbar Abbaspour asfadan, Mahnaz Rabie

    Published 2024-06-01
    “…These conditions are possible through the following ways: improving financial participation, providing simple products with low cost and helping people who do not have easy access to banking services, and improving the customer experience, increasing transparency and improving security, and accommodating retail customers and small and moderate companies to fraudity and cyber-attacks (Wonglimpiyarat, 2017). Due to the importance of this issue, this research seeks to present and propose a suitable model for the implementation of new fintechs in the banking and peer-to-peer lending industry. …”
    Get full text
    Article
  8. 3648

    COVID-19 – if the cure is worse than the disease. The Italian chaos by Giuseppe FERRARI

    Published 2020-03-01
    “…Overall this could lead to an increase of violent behaviours, panic attacks, and a significant growth of psychiatric disorders and suicides. …”
    Article