Search

Showing total 75 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Database Directory of Open Access Journals Remove constraint Database: Directory of Open Access Journals
75 results

Search Results

1. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure

2. Vulnerability issues in Automatic Speaker Verification (ASV) systems

3. Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation

4. Adversarial attacks and defenses for digital communication signals identification

5. Evasive attacks against autoencoder-based cyberattack detection systems in power systems

6. A new method for countering evasion adversarial attacks on information systems based on artificial intelligence

7. Maxwell’s Demon in MLP-Mixer: towards transferable adversarial attacks

8. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

9. Assessing robustness to adversarial attacks in attention-based networks: Case of EEG-based motor imagery classification

10. MEFF – A model ensemble feature fusion approach for tackling adversarial attacks in medical imaging

11. Adversarially Robust Fault Zone Prediction in Smart Grids With Bayesian Neural Networks

12. Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks

13. Adaptive Selection of Loss Function for Federated Learning Clients Under Adversarial Attacks

14. The Impact of Simultaneous Adversarial Attacks on Robustness of Medical Image Analysis

15. How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses

16. Privacy and Security Concerns in Generative AI: A Comprehensive Survey

17. A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach

18. SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

19. Survey of Research Progress on Adversarial Examples in Images

20. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems

21. Method for testing NLP models with text adversarial examples

22. Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach

23. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework

24. Evaluating Neural Networks’ Ability to Generalize against Adversarial Attacks in Cross-Lingual Settings

25. Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring

26. A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism

27. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection

28. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks

29. Privacy and Security in Distributed Learning: A Review of Challenges, Solutions, and Open Research Issues

30. Exploring Transferability on Adversarial Attacks

31. Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks

32. Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications

33. PrivacyMask: Real-world privacy protection in face ID systems

34. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks

35. Adversarial Training Methods for Deep Learning: A Systematic Review

36. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review

37. Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation

38. Low-Pass Image Filtering to Achieve Adversarial Robustness

39. Improving Adversarial Robustness via Distillation-Based Purification

40. On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective

41. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach

42. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems

43. Turning Federated Learning Systems Into Covert Channels

44. A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios

45. A Highly Stealthy Adaptive Decay Attack Against Speaker Recognition

46. A Survey on Efficient Methods for Adversarial Robustness

47. Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

48. Robust transformer with locality inductive bias and feature normalization

49. Polymorphic Adversarial Cyberattacks Using WGAN

50. Fruit-classification model resilience under adversarial attack