Search

Showing total 58 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Database Academic Search Index Remove constraint Database: Academic Search Index
58 results

Search Results

1. Effectiveness of machine learning based android malware detectors against adversarial attacks.

2. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

3. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks.

4. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

5. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

6. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

7. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

8. Low-Pass Image Filtering to Achieve Adversarial Robustness.

9. A perspective on human activity recognition from inertial motion data.

10. State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.

11. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.

12. Enhanced covertness class discriminative universal adversarial perturbations.

13. SOLARNet: A single stage regression based framework for efficient and robust object recognition in aerial images.

14. Neural Adversarial Attacks with Random Noises.

15. Adversarial Training Methods for Deep Learning: A Systematic Review.

16. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).

17. Adversarial attacks on graph-level embedding methods: a case study.

18. Fooling the Big Picture in Classification Tasks.

19. Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems.

20. Survey on federated learning threats: Concepts, taxonomy on attacks and defences, experimental study and challenges.

21. Empiricism in the foundations of cognition.

22. Divergence-Agnostic Unsupervised Domain Adaptation by Adversarial Attacks.

23. Evaluation of adversarial attacks sensitivity of classifiers with occluded input data.

24. Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks.

25. Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation.

26. Explaining adversarial vulnerability with a data sparsity hypothesis.

27. A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking.

28. Face Recognition System Against Adversarial Attack Using Convolutional Neural Network.

29. Adversarial learning techniques for security and privacy preservation: A comprehensive review.

30. RNAS-CL: Robust Neural Architecture Search by Cross-Layer Knowledge Distillation.

31. Cascade & allocate: A cross-structure adversarial attack against models fusing vision and language.

32. Attack-Resistant and Efficient Cancelable Codeword Generation Using Random walk-Based Methods.

33. A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems.

34. Small perturbations are enough: Adversarial attacks on time series prediction.

35. Cognitive data augmentation for adversarial defense via pixel masking.

36. Resilient and constrained consensus against adversarial attacks: A distributed MPC framework.

37. Knowledge-guided semantic computing network.

38. On the Robustness of Semantic Segmentation Models to Adversarial Attacks.

39. On the robustness of skeleton detection against adversarial attacks.

40. Image Super-Resolution as a Defense Against Adversarial Attacks.

41. Perturbation analysis of gradient-based adversarial attacks.

42. Adversarial attacks on fingerprint liveness detection.

43. VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios.

44. Adversarial attacks on deep-learning-based radar range profile target recognition.

45. Improving adversarial robustness of traffic sign image recognition networks.

46. Bi-fidelity evolutionary multiobjective search for adversarially robust deep neural architectures.

47. On the vulnerability of deep learning to adversarial attacks for camera model identification.

48. Collaborative Defense-GAN for protecting adversarial attacks on classification system.

49. Adversarial attacks and active defense on deep learning based identification of GaN power amplifiers under physical perturbation.

50. DetectX—Adversarial Input Detection Using Current Signatures in Memristive XBar Arrays.