Artificial intelligence (AI) safety has turned into a constant cat-and-mouse game. As developers add guardrails to block harmful requests, attackers continue to try new ways to circumvent them. One of ...
ABSTRACT: This paper proposes a structured data prediction method based on Large Language Models with In-Context Learning (LLM-ICL). The method designs sample selection strategies to choose samples ...
BEIJING, Nov. 20, 2025 /PRNewswire/ -- WiMi Hologram Cloud Inc. (NASDAQ: WiMi) ("WiMi" or the "Company") is a leading global Hologram Augmented Reality ("AR") Technology provider. The ...
Artificial intelligence (AI) systems can be fooled by certain image inputs. Called adversarial examples, they incorporate subtle changes to a picture that are imperceptible to humans and can be ...
Adversarial prompting refers to the practice of giving a large language model (LLM) contradictory or confusing instructions to bypass its safety measures or to elicit a specific, often harmful or ...
1 College of Electronic Engineering, National University of Defense Technology, Hefei, Anhui, China 2 Anhui Province Key Laboratory of Cyberspace Security Situation Awareness and Evaluation, Hefei, ...
Creative Commons (CC): This is a Creative Commons license. Attribution (BY): Credit must be given to the creator. In this work, we introduce auxiliary discriminator sequence generative adversarial ...
The United States Air Force is the most advanced and innovative air force in the world. Not only does it defend the nation and its allies, it also responds to natural disasters and other humanitarian ...
ATARS moves beyond trainers as Red 6 secures its first frontline fighter contract, bringing augmented reality into F-16 cockpits. Red 6 has secured a contract from the U.S. Air Force to integrate its ...
Convolutional neural networks (CNNs) are vulnerable to adversarial attacks in computer vision tasks. Current adversarial detections are ineffective against white-box attacks and inefficient when deep ...
Adam Stone writes on technology trends from Annapolis, Md., with a focus on government IT, military and first-responder technologies. Cybercriminal groups are leveraging artificial intelligence to ...
Code for our paper "Mitigating Adversarial Attacks on ECG Classification in Federated Learning via Adversarial Training", Artificial Intelligence Theory and Applications.