Search

Showing total 173 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Database Complementary Index Remove constraint Database: Complementary Index
173 results

Search Results

1. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

2. 图神经网络对抗攻击与鲁棒性评测前沿进展.

3. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

4. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

5. Effectiveness of machine learning based android malware detectors against adversarial attacks.

6. Dealing with the unevenness: deeper insights in graph-based attack and defense.

7. Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study.

8. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

9. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

10. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

11. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

12. RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis.

13. Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection.

14. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

15. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

16. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

17. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

18. Low-Pass Image Filtering to Achieve Adversarial Robustness.

19. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models.

20. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework.

21. Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation.

22. Adversarial Training Methods for Deep Learning: A Systematic Review.

23. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

24. TRIESTE: translation based defense for text classifiers.

25. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems.

26. Improving Adversarial Robustness via Distillation-Based Purification.

27. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach.

28. On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective.

29. Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models.

30. Mitigating Adversarial Attacks against IoT Profiling.

32. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks.

33. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

34. A dilution-based defense method against poisoning attacks on deep learning systems.

35. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach.

36. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

37. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.

38. Neural Adversarial Attacks with Random Noises.

39. Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks.

40. Generating adversarial samples by manipulating image features with auto-encoder.

41. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

42. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

43. A perspective on human activity recognition from inertial motion data.

44. A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles.

45. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.

46. Analysis of Federated Learning Paradigm in Medical Domain: Taking COVID-19 as an Application Use Case.

47. TXAI-ADV: Trustworthy XAI for Defending AI Models against Adversarial Attacks in Realistic CIoT.

48. Machine learning security and privacy: a review of threats and countermeasures.

49. RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.

50. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.