Search

Showing total 54 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Database Complementary Index Remove constraint Database: Complementary Index Publisher springer nature Remove constraint Publisher: springer nature
54 results

Search Results

1. Fast encryption of color medical videos for Internet of Medical Things.

2. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

3. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

4. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

5. Effectiveness of machine learning based android malware detectors against adversarial attacks.

6. Dealing with the unevenness: deeper insights in graph-based attack and defense.

7. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

8. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

9. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

10. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

11. TRIESTE: translation based defense for text classifiers.

12. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

13. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks.

14. A perspective on human activity recognition from inertial motion data.

15. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

16. Generating adversarial samples by manipulating image features with auto-encoder.

17. Adversarial attacks on graph-level embedding methods: a case study.

18. Learning key steps to attack deep reinforcement learning agents.

19. Fooling the Big Picture in Classification Tasks.

20. On the robustness of vision transformers for in-flight monocular depth estimation.

21. Machine learning security and privacy: a review of threats and countermeasures.

22. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

23. 3DVerifier: efficient robustness verification for 3D point cloud models.

24. Defense against adversarial attacks: robust and efficient compressed optimized neural networks.

25. Unlocking adversarial transferability: a security threat towards deep learning-based surveillance systems via black box inference attack- a case study on face mask surveillance.

26. Untargeted white-box adversarial attack to break into deep learning based COVID-19 monitoring face mask detection system.

27. Empiricism in the foundations of cognition.

28. Adversarial examples for extreme multilabel text classification.

29. Evaluation of adversarial attacks sensitivity of classifiers with occluded input data.

30. Adversarial example detection for DNN models: a review and experimental comparison.

31. Clustering-based attack detection for adversarial reinforcement learning.

32. Robust Federated Learning for execution time-based device model identification under label-flipping attack.

33. Towards the transferable audio adversarial attack via ensemble methods.

34. Vulnerable point detection and repair against adversarial attacks for convolutional neural networks.

35. A robust hybrid digital watermarking technique against a powerful CNN-based adversarial attack.

36. Attack-Resistant and Efficient Cancelable Codeword Generation Using Random walk-Based Methods.

37. Adversarial machine learning phases of matter.

38. Exploring misclassifications of robust neural networks to enhance adversarial attacks.

39. Detection of Iterative Adversarial Attacks via Counter Attack.

40. A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems.

41. Adversarial attacks on fingerprint liveness detection.

42. Towards the universal defense for query-based audio adversarial attacks on speech recognition system.

43. Towards adversarial realism and robust learning for IoT intrusion detection and classification.

44. Evil vs evil: using adversarial examples to against backdoor attack in federated learning.

45. Generate adversarial examples by adaptive moment iterative fast gradient sign method.

46. Revisiting model's uncertainty and confidences for adversarial example detection.

47. Minimally Distorted Structured Adversarial Attacks.

48. Understanding deep learning defenses against adversarial examples through visualizations for dynamic risk assessment.

49. Just noticeable difference for machine perception and generation of regularized adversarial images with minimal perturbation.

50. FATALRead - Fooling visual speech recognition models: Put words on Lips.