Results for 'adversarial attacks'

842 found
Order:
  1. Adversarial Attacks on Image Generation With Made-Up Words.Raphaël Millière - manuscript
    Text-guided image generation models can be prompted to generate images using nonce words adversarially designed to robustly evoke specific visual concepts. Two approaches for such generation are introduced: macaronic prompting, which involves designing cryptic hybrid words by concatenating subword units from different languages; and evocative prompting, which involves designing nonce words whose broad morphological features are similar enough to that of existing words to trigger robust visual associations. The two methods can also be combined to generate images associated with more (...)
    Download  
     
    Export citation  
     
    Bookmark  
  2.  51
    Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network.Anderson Brown - 2023 - International Journal of Research and Innovation in Applied Sciences.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on (...) defense strategies, the effectiveness of each defense methods, and finally we did comparison on effectiveness and potency of different adversarial attack and defense methods. We came to conclusion that adversarial attack will mainly be blackbox for the foreseeable future since attacker has limited or no knowledge of gradient use for NN model, we also concluded that as dataset becomes more complex, so will be increase in demand for scalable adversarial defense strategy to mitigate or combat attack, and we strongly recommended that any neural network model with or without defense strategy should regularly be revisited, with the source code continuously updated at regular interval to check for any vulnerability against newer attack. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  3. Comprehensive Review on Advanced Adversarial Attack and Defense Strategies in Deep Neural Network (8th edition). [REVIEW]Smith Oliver & Brown Anderson - 2023 - International Journal of Research and Innovation in Applied Science:156-166.
    In adversarial machine learning, attackers add carefully crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions. In this paper, we did comprehensive review of some of the most recent research, advancement and discoveries on adversarial attack, adversarial sampling generation, the potency or effectiveness of each of the existing attack methods, we also did comprehensive review on some of the most recent research, advancement and discoveries on (...) defense strategies, the effectiveness of each defense methods, and finally we did comparison on effectiveness and potency of different adversarial attack and defense methods. We came to conclusion that adversarial attack will mainly be blackbox for the foreseeable future since attacker has limited or no knowledge of gradient use for NN model, we also concluded that as dataset becomes more complex, so will be increase in demand for scalable adversarial defense strategy to mitigate or combat attack, and we strongly recommended that any neural network model with or without defense strategy should regularly be revisited, with the source code continuously updated at regular interval to check for any vulnerability against newer attack. (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  4. Adversarial Sampling for Fairness Testing in Deep Neural Network.Tosin Ige, William Marfo, Justin Tonkinson, Sikiru Adewale & Bolanle Hafiz Matti - 2023 - International Journal of Advanced Computer Science and Applications 14 (2).
    In this research, we focus on the usage of adversarial sampling to test for the fairness in the prediction of deep neural network model across different classes of image in a given dataset. While several framework had been proposed to ensure robustness of machine learning model against adversarial attack, some of which includes adversarial training algorithm. There is still the pitfall that adversarial training algorithm tends to cause disparity in accuracy and robustness among different group. Our (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  5. In defence of adversarial philosophy?Terence Rajivan Edward - manuscript
    Adversarial philosophy is under attack (!), but I speculate that it is useful for working out the level of a philosopher and sometimes for increasing the respect awarded to some individuals and groups. There may be no alternative to it when you have an excess of philosophers of around the same level.
    Download  
     
    Export citation  
     
    Bookmark  
  6.  50
    Impact of Variation in Vector Space on the performance of Machine and Deep Learning Models on an Out-of-Distribution malware attack Detection.Tosin Ige - forthcoming - Ieee Conference Proceeding.
    Several state-of-the-art machine and deep learning models in the mode of adversarial training, input transformation, self adaptive training, adversarial purification, zero-shot, one- shot, and few-shot meta learning had been proposed as a possible solution to an out-of-distribution problems by applying them to wide arrays of benchmark dataset across different research domains with varying degrees of performances, but investigating their performance on previously unseen out-of- distribution malware attack remains elusive. Having evaluated the poor performances of these state-of-the-art approaches in (...)
    Download  
     
    Export citation  
     
    Bookmark  
  7.  27
    Empowering Cybersecurity with Intelligent Malware Detection Using Deep Learning Techniques.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-665.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  8.  25
    Revolutionizing Cybersecurity: Intelligent Malware Detection Through Deep Neural Networks.M. Sheik Dawood - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):655-666.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  9.  27
    A Novel Deep Learning-Based Framework for Intelligent Malware Detection in Cybersecurity.P. Selvaprasanth - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):666-669.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  10.  18
    Advanced Deep Learning Models for Proactive Malware Detection in Cybersecurity Systems.A. Manoj Prabharan - 2023 - Journal of Science Technology and Research (JSTAR) 5 (1):666-676.
    By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by training DL models to classify malicious and benign software with high precision. A robust experimental setup evaluates the framework using benchmark malware datasets, yielding a 96% detection accuracy and demonstrating resilience against adversarial attacks. Real-time analysis capabilities (...)
    Download  
     
    Export citation  
     
    Bookmark  
  11.  17
    Intelligent Malware Detection Empowered by Deep Learning for Cybersecurity Enhancement.M. Arulselvan - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):625-635.
    With the proliferation of sophisticated cyber threats, traditional malware detection techniques are becoming inadequate to ensure robust cybersecurity. This study explores the integration of deep learning (DL) techniques into malware detection systems to enhance their accuracy, scalability, and adaptability. By leveraging convolutional neural networks (CNNs), recurrent neural networks (RNNs), and transformers, this research presents an intelligent malware detection framework capable of identifying both known and zero-day threats. The methodology involves feature extraction from static, dynamic, and hybrid malware datasets, followed by (...)
    Download  
     
    Export citation  
     
    Bookmark  
  12. Targeted Human Trafficking -- The Wars between Proxy and Surrogated Economy.Yang Immanuel Pachankis - 2022 - International Journal of Scientific and Engineering Research 13 (7):398-409.
    Upon Brexit & Trade War, the research took a supply-side analysis in macroeconomic paradigm for the purpose and cause of the actions. In the geopolitical competitions on crude oil resources between the allied powers & the Russian hegemony, the latter of which has effective control over P. R. China’s multilateral behaviors, the external research induced that trade war, either by complete information in intelligence or an unintended result, was a supply chain attack in prohibiting the antisatellite weapon supplies in the (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  13. Adversarial argumentation and common ground in Aristotle’s Sophistical Refutations.Colin Guthrie King - 2021 - Topoi 40 (5):939-950.
    In this paper I provide support for the view that at least some forms of adversariality in argumentation are legitimate. The support comes from Aristotle’s theory of illegitimate adversarial argumentation in dialectical contexts: his theory of eristic in his work On Sophistical Refutations. Here Aristotle develops non-epistemic standards for evaluating the legitimacy of dialectical procedures, standards which I propose can be understood in terms of the pragmatic notion of context as common ground. Put briefly, Aristotle makes the answerer’s meaning (...)
    Download  
     
    Export citation  
     
    Bookmark  
  14. An Adversarial Ethics of Campaigns and Elections.Samuel Bagg & Isak Tranvik - 2019 - Perspectives on Politics 4 (17):973-987.
    Existing approaches to campaign ethics fail to adequately account for the “arms races” incited by competitive incentives in the absence of effective sanctions for destructive behaviors. By recommending scrupulous devotion to unenforceable norms of honesty, these approaches require ethical candidates either to quit or lose. To better understand the complex dilemmas faced by candidates, therefore, we turn first to the tradition of “adversarial ethics,” which aims to enable ethical participants to compete while preventing the most destructive excesses of competition. (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  15. Adversariality and Ideal Argumentation: A Second-Best Perspective.Marc-Kevin Daoust - 2021 - Topoi 40 (5):887-898.
    What is the relevance of ideals for determining virtuous argumentative practices? According to Bailin and Battersby (2016), the telos of argumentation is to improve our cognitive systems, and adversariality plays no role in ideally virtuous argumentation. Stevens and Cohen (2019) grant that ideal argumentation is collaborative, but stress that imperfect agents like us should not aim at approximating the ideal of argumentation. Accordingly, it can be virtuous, for imperfect arguers like us, to act as adversaries. Many questions are left unanswered (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  16. Against Adversarial Discussion.Maarten Steenhagen - 2016 - Collingwood and British Idealism Studies 22 (1):87-112.
    Why did R.G. Collingwood come to reject the adversarial style of philosophical discussion so popular among his Oxford peers? The main aim of this paper is to explain that Collingwood came to reject his colleagues’ specific style of philosophical dialogue on methodological grounds, and to show how the argument against adversarial philosophical discussion is integrated with Collingwood’s overall criticism of realist philosophy. His argument exploits a connection between method and practice that should be taken seriously even today.
    Download  
     
    Export citation  
     
    Bookmark  
  17. Self-Adversarial Surveillance for Superalignment.R. Ishizaki & Mahito Sugiyama - manuscript
    In this paper, first we discuss the conditions under which a Large Language Model (LLM) can emulate a superior LLM and potentially trigger an intelligence explosion, along with the characteristics and dangers of the resulting superintelligence. We also explore ``superalignment,'' the process of safely keeping an intelligence explosion under human control. We discuss the goals that should be set for the initial LLM that might trigger the intelligence explosion and the Self-Adversarial Surveillance (SAS) system, which involves having the LLM (...)
    Download  
     
    Export citation  
     
    Bookmark  
  18. Adversaries or allies? Occasional thoughts on the Masham-Astell exchange.Jacqueline Broad - 2003 - Eighteenth-Century Thought 1:123-49.
    Against the backdrop of the English reception of Locke’s Essay, stands a little-known philosophical dispute between two seventeenth-century women writers: Mary Astell (1666-1731) and Damaris Cudworth Masham (1659-1708). On the basis of their brief but heated exchange, Astell and Masham are typically regarded as philosophical adversaries: Astell a disciple of the occasionalist John Norris, and Masham a devout Lockean. In this paper, I argue that although there are many respects in which Astell and Masham are radically opposed, the two women (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  19. Heart attack analysis & Prediction: A Neural Network Approach with Feature Analysis.Majd N. Allouh & Samy S. Abu-Naser - 2023 - International Journal of Academic Information Systems Research (IJAISR) 7 (9):47-54.
    heart attack analysis & prediction dataset is a major cause of death worldwide. Early detection and intervention are essential for improving the chances of a positive outcome. This study presents a novel approach to predicting the likelihood of a person having heart failure using a neural network model. The dataset comprises 304 samples with 11 features, such as age, sex, chest pain type, Trtbps, cholesterol, fasting blood sugar, resting electrocardiogram results, maximum heart rate achieved, exercise-induced angina, oldpeak, ST_Slope, and HeartDisease. (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  20. The Adversary System: Who Needs It?Edmund Byrne - 1986 - In Elliston M. Davis and F. A. (ed.), Ethics and the Legal Profession. Prometheus. pp. 204-215.
    -/- [Posted here is article as originally published (same title) in ALSA Forum VI (1982) pp. 1-17 plus rebuttal by Thomas D. Barton, pp. 18-22].
    Download  
     
    Export citation  
     
    Bookmark  
  21. Prediction Heart Attack using Artificial Neural Networks (ANN).Ibrahim Younis, Mohammed S. Abu Nasser, Mohammed A. Hasaballah & Samy S. Abu-Naser - 2023 - International Journal of Engineering and Information Systems (IJEAIS) 7 (10):36-41.
    Abstract Heart Attack is the Cardiovascular Disease (CVD) which causes the most deaths among CVDs. We collected a dataset from Kaggle website. In this paper, we propose an ANN model for the predicting whether a patient has a heart attack or not that. The dataset set consists of 9 features with 1000 samples. We split the dataset into training, validation, and testing. After training and validating the proposed model, we tested it with testing dataset. The proposed model reached an accuracy (...)
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  22. Pro-Generative Adversarial Network and V-stack Perceptron, Diamond Holographic Principle, and Pro-Temporal Emergence.Shanna Dobson - manuscript
    We recently presented our Efimov K-theory of Diamonds, proposing a pro-diamond, a large stable (∞,1)-category of diamonds (D^{diamond}), and a localization sequence for diamond spectra. Commensurate with the localization sequence, we now detail four potential applications of the Efimov K-theory of D^{diamond}: emergent time as a pro-emergence (v-stack time) in a diamond holographic principle using Scholze’s six operations in the ’etale cohomology of diamonds; a pro-Generative Adversarial Network and v-stack perceptron; D^{diamond}cryptography; and diamond nonlocality in perfectoid quantum physics.
    Download  
     
    Export citation  
     
    Bookmark   1 citation  
  23. Ang Attack on Titan ni Hajime Isayama Batay sa Iba't Ibang Pilosopikal na Pananaw.Mark Joseph Santos - 2022 - Dalumat E-Journal 8 (1):68-91.
    Dalawa sa mga hibla ng Pilosopiyang Filipino ay patungkol sa paggamit ng banyagang pilosopiya at pamimilosopiya sa wikang Filipino. Makatutulong ang dalawang ito tungo sa pagsasalin ng mga banyagang kaisipan sa talastasang bayan. Ang dalawang hiblang ito ang nais na ambagan ng kasalukuyang sanaysay, sa pamamagitan ng pagsasagawa ng rebyu sa isang halimbawa ng anime/manga na Hapon: ang Attack on Titan (AOT) ni Hajime Isayama. Gagamitin sa pagbasa ng AOT ang mga pilosopikal na pananaw ng ilang Aleman/Austrianong pilosoper/sikolohista na sina (...)
    Download  
     
    Export citation  
     
    Bookmark  
  24. The Attack on Liberalism.Mark R. Reiff - 2007 - In Michael D. A. Freeman & Ross Harrison (eds.), Law and philosophy. New York: Oxford University Press.
    Liberalism is today under attack. This attack is being fought along two fronts, and so appears to be coming from different directions, but it is actually coming exclusively from the right. One source is Islamic fundamentalism, and the other is American neo-conservatism, which in turn unites elements of Christian fundamentalism with elements of neo-Platonic political philosophy and neo-Aristotelian moral theory. Both Islamic fundamentalism and American neo-conservatism are perfectionist views, and while perfectionist attacks on liberalism are nothing new, there is (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  25. Strategies of Character Attack.Fabrizio Macagno - 2013 - Argumentation 27 (4):1-33.
    Why are personal attacks so powerful? In political debates, speeches, discussions and campaigns, negative character judgments, aggressive charges and charged epithets are used for different purposes. They can block the dialogue, trigger value judgments and influence decisions; they can force the interlocutor to withdraw a viewpoint or undermine his arguments. Personal attacks are not only multifaceted dialogical moves, but also complex argumentative strategies. They can be considered as premises for further arguments based on signs, generalizations or consequences. They (...)
    Download  
     
    Export citation  
     
    Bookmark   13 citations  
  26. Attacking authority.Matthews Steve - 2011 - Australian Journal of Professional and Applied Ethics 13 (2):59-70.
    The quality of our public discourse – think of the climate change debate for instance – is never very high. A day spent observing it reveals a litany of misrepresentation and error, argumentative fallacy, and a general lack of good will. In this paper I focus on a microcosmic aspect of these practices: the use of two types of argument – the argumentum ad hominem and appeal to authority – and a way in which they are related. Public debate is (...)
    Download  
     
    Export citation  
     
    Bookmark  
  27. Attack Prevention in IoT through Hybrid Optimization Mechanism and Deep Learning Framework.Regonda Nagaraju, Jupeth Pentang, Shokhjakhon Abdufattokhov, Ricardo Fernando CosioBorda, N. Mageswari & G. Uganya - 2022 - Measurement: Sensors 24:100431.
    The Internet of Things (IoT) connects schemes, programs, data management, and operations, and as they continuously assist in the corporation, they may be a fresh entryway for cyber-attacks. Presently, illegal downloading and virus attacks pose significant threats to IoT security. These risks may acquire confidential material, causing reputational and financial harm. In this paper hybrid optimization mechanism and deep learning,a frame is used to detect the attack prevention in IoT. To develop a cybersecurity warning system in a huge (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  28. The Liability of Justified Attackers.Uwe Steinhoff - 2016 - Ethical Theory and Moral Practice 19 (4):1016-1030.
    McMahan argues that justification defeats liability to defensive attack (which would undermine the thesis of the "moral equality of combatants"). In response, I argue, first, that McMahan’s attempt to burden the contrary claim with counter-intuitive implications fails; second, that McMahan’s own position implies that the innocent civilians do not have a right of self-defense against justified attackers, which neither coheres with his description of the case (the justified bombers infringe the rights of the civilians) nor with his views about rights (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  29. Science Under Attack.Nicholas Maxwell - 2005 - The Philosopher’s Magazine 31:37-41.
    Science has been under attack ever since William Blake and Romantic movement. In our time, criticisms of modern science have led to Alan Sokal's spoof, and the so-called science wars. Both sides missed the point. Science deserves to be criticized for seriously misrepresenting its highly problematic aims, which have metaphysical, value and political assumptions associated with them. Instead of repressing these problematic aims, science ought rather to make them explicit, so that they can be critically assessed and, we may hope, (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  30. (1 other version) Probabilistic interpretations of argumentative attacks: logical and experimental foundations.Niki Pfeifer & C. G. Fermüller - 2018 - In V. Kratochvíl & J. Vejnarová (eds.), 11th Workshop on Uncertainty Processing (WUPES'18). pp. 141-152.
    We present an interdisciplinary approach to study systematic relations between logical form and attacks between claims in an argumentative framework. We propose to generalize qualitative attack principles by quantitative ones. Specifically, we use coherent conditional probabilities to evaluate the rationality of principles which govern the strength of argumentative attacks. Finally, we present an experiment which explores the psychological plausibility of selected attack principles.
    Download  
     
    Export citation  
     
    Bookmark  
  31. Xenophobic Attacks on Nigerians in South Africa: Ethical implications and Responses of the Nigerian Government.Big-Alabo Sotonye & Big-Alabo Tamunopubo - 2020 - International Journal of Multidisciplinary Research and Development 7 (3):36-41.
    This study examines the xenophobic attacks on Nigerians in South Africa, its ethical implications and responses of the Nigerian government. The study was guided by two objectives while it adopted the normative theory by Plato and Aristotle. The study looked at conceptual clarification like the concept of xenophobia. The study adopted ex-post research design while data was sourced through secondary source such as textbooks, journal articles, newspapers, magazines and internet while the data generated was analyzed through content analysis. The (...)
    Download  
     
    Export citation  
     
    Bookmark  
  32. Another attack on Evolution, Rationality and Civilization. A review of Nowak and Highfield ‘SuperCooperators’ (2012).Starks Michael - 2016 - In Michael Starks (ed.), Suicidal Utopian Delusions in the 21st Century: Philosophy, Human Nature and the Collapse of Civilization-- Articles and Reviews 2006-2017 2nd Edition Feb 2018. Las Vegas, USA: Reality Press. pp. 555-560.
    Nowak is (or was) a respected Harvard professor of mathematical biology with numerous well regarded publications. Sadly, he has chosen to launch an arrogant attack on science motivated by religious fervor. His recent actions show the evil consequences when universities accept money from religious groups, science journals are so awed by big names that they avoid proper peer review, and egos are permitted to get out of control. Most of this book is good, but it repeats the utterly misconceived (...) on inclusive fitness in favor of group selection which he and his much more famous Harvard colleague E.O.Wilson have been making the last 5 years, so it is on that chapter of the book that I will concentrate. This takes us into the nature of evolution, the basics of scientific methodology, how math relates to science, what constitutes a law or a theory, and what attitudes to religion and generosity are appropriate as we inexorably approach the collapse of industrial civilization. -/- Those wishing a comprehensive up to date framework for human behavior from the modern two systems view may consult my book ‘The Logical Structure of Philosophy, Psychology, Mind and Language in Ludwig Wittgenstein and John Searle’ 2nd ed (2019). Those interested in more of my writings may see ‘Talking Monkeys--Philosophy, Psychology, Science, Religion and Politics on a Doomed Planet--Articles and Reviews 2006-2019 3rd ed (2019), The Logical Structure of Human Behavior (2019), and Suicidal Utopian Delusions in the 21st Century 4th ed (2019). (shrink)
    Download  
     
    Export citation  
     
    Bookmark  
  33. The Terrorist Attacks in Norway, July 22nd 2011— Some Kantian Reflections.Helga Varden - 2014 - Norsk Filosofisk Tidsskrift 49 (3-4):236-259.
    This paper provides a Kantian interpretation of core issues involved in the trial following the terrorist attacks that struck Norway on July 22nd 2011. After a sketch of the controversies surrounding the trial itself, a Kantian theory of why the wrongdoer’s mind struck us as so endlessly disturbed is presented. This Kantian theory, I proceed by arguing, also helps us understand why it was so important to respond to the violence through the legal system and to treat the perpetrator, (...)
    Download  
     
    Export citation  
     
    Bookmark   3 citations  
  34. Interaction Attacks as Deceitful Connected and Automated Vehicle Behaviour.F. Fossa, Luca Paparusso & Francesco Braghin - 2024 - In S. Parkinson, A. Nikitas & M. Vallati (eds.), Deception in Autonomous Transport Systems. Threats, Impacts, and Mitigation Policies. Cham: Springer. pp. 147-162.
    Download  
     
    Export citation  
     
    Bookmark  
  35. Israel’s attack on gaza: some philosophical reflections [online].Peter Cave - 2024 - Daily Philosophy.
    The attachment for download here merely references my 5,500-word final and extended article, criticising those who seek to justify Israeli attacks on Gaza. The article is published online by Daily Philosophy, 5th January 2024, link shown below. -/- After a background of facts (probably well-known by readers concerned about the matters), the article examines typical arguments much used in the media as attempts to justify Israel’s determined destruction of Gaza, involving well over twenty thousand Palestinians killed, hundreds of thousands (...)
    Download  
     
    Export citation  
     
    Bookmark  
  36. On Hume on space: Green's attack, James' empirical response.Alexander Klein - 2009 - Journal of the History of Philosophy 47 (3):pp. 415-449.
    ABSTRACT. Associationist psychologists of the late 19th-century premised their research on a fundamentally Humean picture of the mind. So the very idea of mental science was called into question when T. H. Green, a founder of British idealism, wrote an influential attack on Hume’s Treatise. I first analyze Green’s interpretation and criticism of Hume, situating his reading with respect to more recent Hume scholarship. I focus on Green’s argument that Hume cannot consistently admit real ideas of spatial relations. I then (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  37. Two Paradoxes of Common Knowledge: Coordinated Attack and Electronic Mail.Harvey Lederman - 2018 - Noûs 52 (4):921-945.
    The coordinated attack scenario and the electronic mail game are two paradoxes of common knowledge. In simple mathematical models of these scenarios, the agents represented by the models can coordinate only if they have common knowledge that they will. As a result, the models predict that the agents will not coordinate in situations where it would be rational to coordinate. I argue that we should resolve this conflict between the models and facts about what it would be rational to do (...)
    Download  
     
    Export citation  
     
    Bookmark   12 citations  
  38. Touch and play—'spiritual attacks' in ayahuasca ceremonies.Mika Turkia - manuscript
    This article describes a case of a ’spiritual attack’ in the context of Amazonian ayahuasca ceremonies. These attacks are often assumed to be imaginary, and there is relatively little information available about them. Specifically, there appears to be no documentation about possible mechanisms of action for these attacks. Subjectively, they typically appear as context-dependent visions or somatic sensations that represent disease-inducing or lethal interventions from an external hostile party. -/- Such ’spiritual attacks’ could tentatively be conceptualized as (...)
    Download  
     
    Export citation  
     
    Bookmark  
  39. Frege's attack on Husserl and Cantor.Claire Ortiz Hill - 1994 - The Monist 77 (3):345 - 357.
    By drawing attention to these facts and to the relationship between Cantor’s and Husserl's ideas, I have tried to contribute to putting Frege's attack on Husserl "in the proper light" by providing some insight into some of the issues underling criticisms which Frege himself suggested were not purely aimed at Husserl's book. I have tried to undermine the popular idea that Frege's review of the Philosophy of Arithmetic is a straightforward, objective assessment of Husserl’s book, and to give some specific (...)
    Download  
     
    Export citation  
     
    Bookmark   4 citations  
  40. Computationalism under attack.Roberto Cordeschi & Marcello Frixione - 2007 - In M. Marraffa, M. Caro & F. Ferretti (eds.), Cartographies of the Mind: Philosophy and Psychology in Intersection. Springer.
    Since the early eighties, computationalism in the study of the mind has been “under attack” by several critics of the so-called “classic” or “symbolic” approaches in AI and cognitive science. Computationalism was generically identified with such approaches. For example, it was identified with both Allen Newell and Herbert Simon’s Physical Symbol System Hypothesis and Jerry Fodor’s theory of Language of Thought, usually without taking into account the fact ,that such approaches are very different as to their methods and aims. Zenon (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
  41. Experimental Evidence against Pyrrhonism: Attacking a Straw Man.Diego E. Machuca - 2022 - Dialogue 61 (1):123-138.
    In a recent article, Mario Attie-Picker maintains that a number of experimental studies provide evidence against Sextus Empiricus’s empirical claims about both the connection between belief and anxiety and the connection between suspension of judgement and undisturbedness. In this article, I argue that Sextus escapes unharmed from the challenge raised by the studies in question for the simple reason that he does not make the claims ascribed to him. In other words, I argue that Attie-Picker is attacking a straw man.
    Download  
     
    Export citation  
     
    Bookmark  
  42. Healthy Conflict in Contemporary American Society: From Enemy to Adversary.Jason A. Springs - 2018 - Cambridge: Cambridge University Press.
    US citizens perceive their society to be one of the most diverse and religiously tolerant in the world today. Yet seemingly intractable religious intolerance and moral conflict abound throughout contemporary US public life - from abortion law battles, same-sex marriage, post-9/11 Islamophobia, public school curriculum controversies, to moral and religious dimensions of the Black Lives Matter and Occupy Wall Street movements, and Tea Party populism. Healthy Conflict in Contemporary American Society develops an approach to democratic discourse and coalition-building across deep (...)
    Download  
     
    Export citation  
     
    Bookmark   6 citations  
  43. A Teleosemantic Response to Burge’s Attack on Semantic Reductionism.Sérgio Farias de Souza Filho - 2024 - Erkenntnis:1-19.
    Tyler Burge is famous for defending primitivist naturalism about mental representations, according to which mental representations are primitive natural states. Primitivist naturalism contrasts with semantic reductionism, according to which mental representations are reducible to more fundamental natural states. Burge developed the most compelling and influential attack on semantic reductionism from a primitivist naturalist point of view. My goal in this paper is to defend semantic reduc- tionism from Burge’s attack. I assess and refute his objection to the motivations for semantic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  44. Xenophobia attack and development: a discourse in South Africa.Mompati Vincent Chakale, Phemelo Olifile Marumo & Amantle Mothelesi - 2019 - African Renaissance 2019 (special issue):185-198.
    The social and political development among countries has affected relationships and that has ushered a new era wherein others nations feel that they are better off than others. The mentality of betterment has resulted in hatred among nations in the same country and from different nations. This has culminated into civil war from within and clashes from without. These conflicts have divided countries especially in Africa which is propagating Ubuntu and communalism. From the premise, the paper will investigate the historical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  45.  87
    The Hypothetical Imperative as an Indicator of Irrational Will: The Case of the 2018 Toronto Van Attack.Kevin Michael Stevenson - 2023 - International Journal of Theology, Philosophy and Science 7 (13):13-23.
    The categorical imperative inherent in Kant’s ethics has had indubitable historical influence on societies worldwide whether in the form of laws, democracy or public deliberation. The Toronto Van Attack of 2018 and its subsequent legal trial is a case example that shows how the categorical imperative can be applied to assist in understanding the reasoning for the case’s guilty verdict. This paper will convey the applicability of the categorical imperative for examining criminal case studies by closing the gap between ethical (...)
    Download  
     
    Export citation  
     
    Bookmark  
  46.  76
    OPTIMIZED INTRUSION DETECTION MODEL FOR IDENTIFYING KNOWN AND INNOVATIVE CYBER ATTACKS USING SUPPORT VECTOR MACHINE (SVM) ALGORITHMS.S. Yoheswari - 2024 - Journal of Science Technology and Research (JSTAR) 5 (1):398-404.
    The ever-evolving landscape of cyber threats necessitates robust and adaptable intrusion detection systems (IDS) capable of identifying both known and emerging attacks. Traditional IDS models often struggle with detecting novel threats, leading to significant security vulnerabilities. This paper proposes an optimized intrusion detection model using Support Vector Machine (SVM) algorithms tailored to detect known and innovative cyberattacks with high accuracy and efficiency. The model integrates feature selection and dimensionality reduction techniques to enhance detection performance while reducing computational overhead. By (...)
    Download  
     
    Export citation  
     
    Bookmark  
  47. An Attack on the Realm: a Review of In Defence of the Realm: by David Conway. [REVIEW]J. C. Lester - 2006 - Journal of Libertarian Studies 20 (3): 81-89.
    This book has many arguments doing an excellent job of dismantling the positions of those who would have the state do considerably more than defend the national realm. Thus far, it is hard for me to fault it—which is more difficult when one is already in agreement: the ideologically opposed can often provide more useful criticisms. But, as the book‟s title indicates, it does not go all the way to anarcho-liberalism (in fact, it does not even fully embody certain basic (...)
    Download  
     
    Export citation  
     
    Bookmark  
  48. How to Attack a Non-Strawman: a Reply to the Andrew I. Cohen Review of Escape from Leviathan.J. C. Lester - manuscript
    Primarily using philosophy, but also some social science, Escape from Leviathan (EfL) explains and defends what it calls an extreme version of the implicit ‘classical liberal compatibility thesis’: liberty, welfare, and anarchy are overwhelmingly complementary in normal practice (rationality is added for its intimate theoretical connections to these categories). This is done using theories, not definitions, of each concept. This important thesis is entirely positive. Therefore, somewhat unusually, all normative issues are avoided as irrelevant distractions in this context. In addition, (...)
    Download  
     
    Export citation  
     
    Bookmark  
  49.  95
    Robust Cyber Attack Detection with Support Vector Machines: Tackling Both Established and Novel Threats.M. Arul Selvan - 2021 - Journal of Science Technology and Research (JSTAR) 2 (1):160-165.
    The proposed IDS model is aimed at detecting network intrusions by classifying all the packet traffic in the network as benign or malicious classes. The Canadian Institute for Cyber security Intrusion Detection System (CICIDS2017) dataset has been used to train and validate the proposed model. The model has been evaluated in terms of the overall accuracy, attack detection rate, false alarm rate, and training overhead. DDOS attacks based on Canadian Institute for Cyber security Intrusion Detection System (KDD Cup 99) (...)
    Download  
     
    Export citation  
     
    Bookmark  
  50. Transformative experiences, rational decisions and shark attacks.Marc-Kevin Daoust - 2024 - Inquiry: An Interdisciplinary Journal of Philosophy 67 (6):1619-1639.
    How can we make rational decisions that involve transformative experiences, that is, experiences that can radically change our core preferences? L. A. Paul (2014) has argued that many decisions involving transformative experiences cannot be rational. However, Paul acknowledges that some traumatic events can be transformative experiences, but are nevertheless not an obstacle to rational decision-making. For instance, being attacked by hungry sharks would be a transformative experience, and yet, deciding not to swim with hungry sharks is rational. Paul has tried (...)
    Download  
     
    Export citation  
     
    Bookmark   2 citations  
1 — 50 / 842