Akademska digitalna zbirka SLovenije - logo

Search results

Basic search    Advanced search   
Search
request
Library

Currently you are NOT authorised to access e-resources SI consortium. For full access, REGISTER.

1 2 3 4 5
hits: 8,719
1.
  • Adversarial examples for re... Adversarial examples for replay attacks against CNN-based face recognition with anti-spoofing capability
    Zhang, Bowen; Tondi, Benedetta; Barni, Mauro Computer vision and image understanding, August 2020, 2020-08-00, Volume: 197-198
    Journal Article
    Peer reviewed

    In the race of arms between attackers, trying to build more and more realistic face replay attacks, and defenders, deploying spoof detection modules with ever-increasing capabilities, CNN-based ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, SAZU, SBCE, UL, UPCLJ, UPUK
2.
  • The efficiency of worked ex... The efficiency of worked examples compared to erroneous examples, tutored problem solving, and problem solving in computer-based learning environments
    McLaren, Bruce M.; van Gog, Tamara; Ganoe, Craig ... Computers in human behavior, February 2016, 2016-02-00, Volume: 55
    Journal Article
    Peer reviewed
    Open access

    How much instructional assistance to provide to students as they learn, and what kind of assistance to provide, is a much-debated problem in research on learning and instruction. This study presents ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
3.
  • Wild patterns: Ten years af... Wild patterns: Ten years after the rise of adversarial machine learning
    Biggio, Battista; Roli, Fabio Pattern recognition, December 2018, 2018-12-00, Volume: 84
    Journal Article
    Peer reviewed
    Open access

    •We provide a detailed review of the evolution of adversarial machine learning over the last ten years.•We start from pioneering work up to more recent work aimed at understanding the security ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
4.
  • A Really Good Example Helps... A Really Good Example Helps Learning About an Abstract Concept
    Funkhouser, Ava; Nicoladis, Elena International journal for the scholarship of teaching and learning, 2023, Volume: 17, Issue: 1
    Journal Article
    Peer reviewed
    Open access

    University students are often asked to learn abstract concepts. Abstract concepts are hard to learn. Giving specific examples can help learning abstract concepts. These examples might limit ...
Full text
Available for: NUK, UL, UM, UPUK
5.
  • Understanding adversarial t... Understanding adversarial training: Increasing local stability of supervised models through robust optimization
    Shaham, Uri; Yamada, Yutaro; Negahban, Sahand Neurocomputing, 09/2018, Volume: 307
    Journal Article
    Peer reviewed
    Open access

    We show that adversarial training of supervised learning models is in fact a robust optimization procedure. To do this, we establish a general framework for increasing local stability of supervised ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UL, UM, UPCLJ, UPUK, ZRSKP

PDF
6.
  • Dual-Branch Sparse Self-Lea... Dual-Branch Sparse Self-Learning with Instance Binding Augmentation for Adversarial Detection in Remote Sensing Images
    Zhang, Zhentong; Li, Xinde; Li, Heqing ... IEEE transactions on geoscience and remote sensing, 07/2024, Volume: 62
    Journal Article
    Peer reviewed

    Remote sensing image analysis technology based on neural networks has significantly facilitated human life. However, adversarial attacks can drastically impair the performance of these models, posing ...
Full text
Available for: IJS, NUK, UL
7.
  • Virtual Adversarial Trainin... Virtual Adversarial Training: A Regularization Method for Supervised and Semi-Supervised Learning
    Miyato, Takeru; Maeda, Shin-Ichi; Koyama, Masanori ... IEEE transactions on pattern analysis and machine intelligence, 2019-Aug.-1, 2019-Aug, 2019-8-1, 20190801, Volume: 41, Issue: 8
    Journal Article
    Peer reviewed
    Open access

    We propose a new regularization method based on virtual adversarial loss: a new measure of local smoothness of the conditional label distribution given input. Virtual adversarial loss is defined as ...
Full text
Available for: IJS, NUK, UL

PDF
8.
  • Example-based learning Example-based learning
    Hoogerheide, Vincent; Roelle, Julian Applied cognitive psychology, July/August 2020, Volume: 34, Issue: 4; special issue
    Journal Article
    Peer reviewed
    Open access

    Decades of research has shown that example-based learning is an effective instructional strategy for learning new skills. The field of learning from examples is seeing a shift in focus towards more ...
Full text
Available for: DOBA, FZAB, GIS, IJS, IZUM, KILJ, NLZOH, NUK, OILJ, PILJ, PNG, SAZU, SBCE, SBMB, UILJ, UKNU, UL, UM, UPUK

PDF
9.
  • Video‐based modeling exampl... Video‐based modeling examples and comparative self‐explanation prompts for teaching a complex problem‐solving strategy
    Meier, Julius Moritz; Hesse, Peter; Abele, Stephan ... Journal of computer assisted learning, August 2024, Volume: 40, Issue: 4
    Journal Article
    Peer reviewed
    Open access

    Background In example‐based learning, examples are often combined with generative activities, such as comparative self‐explanations of example cases. Comparisons induce heavy demands on working ...
Full text
Available for: BFBNIB, FZAB, GIS, IJS, KILJ, NLZOH, NUK, OILJ, SAZU, SBCE, SBMB, UL, UM, UPUK
10.
  • The nature of students’ pro... The nature of students’ productive and non-productive example-use for proving
    Aricha-Metzer, Inbar; Zaslavsky, Orit The Journal of mathematical behavior, March 2019, 2019-03-00, Volume: 53
    Journal Article
    Peer reviewed

    •Generic example-use is productive for proving.•Students have a relatively strong tendency to use examples generically.•Example-use may be more productive when the source of example is external.•The ...
Full text
Available for: GEOZS, IJS, IMTLJ, KILJ, KISLJ, NLZOH, NUK, OILJ, PNG, SAZU, SBCE, SBJE, UILJ, UL, UM, UPCLJ, UPUK, ZAGLJ, ZRSKP
1 2 3 4 5
hits: 8,719

Load filters