Search

Showing total 69 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Database OpenAIRE Remove constraint Database: OpenAIRE
69 results

Search Results

1. Can We Trust AI-Powered Real-Time Embedded Systems? (Invited Paper)

2. Sound classification using wavelet transformation and deep learning methods

3. Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring

4. Adversarial Scratches: Deployable Attacks to CNN Classifiers

5. Towards robust rain removal against adversarial attacks: a comprehensive benchmark analysis and beyond

6. Survey on federated learning threats: Concepts, taxonomy on attacks and defences, experimental study and challenges

7. A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism

8. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review

9. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach

10. Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications

11. One evolutionary algorithm deceives humans and ten convolutional neural networks trained on ImageNet at image recognition

12. Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation

13. Defending Adversarial Examples via DNN Bottleneck Reinforcement

14. Adversarial attacks and active defense on deep learning based identification of GaN power amplifiers under physical perturbation

15. SIEMS:A Secure Intelligent Energy Management System for Industrial IoT applications

16. RSMDA: Random Slices Mixing Data Augmentation

17. Harnessing the Adversarial Perturbation to Enhance Security in the Autoencoder-Based Communication System

18. Hardware and Software Optimizations for Accelerating Deep Neural Networks: Survey of Current Trends, Challenges, and the Road Ahead

19. A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios

20. Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review

21. Fruit-classification model resilience under adversarial attack

22. Polymorphic Adversarial Cyberattacks Using WGAN

23. Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments

24. Addressing Adversarial Attacks Against Security Systems Based on Machine Learning

25. Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning

26. SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks

27. Adversarial attacks and defenses in Speaker Recognition Systems

28. Multivariate Lipschitz Analysis of the Stability of Neural Networks

29. Evolutionary Algorithm-Based Images, Humanly Indistinguishable and Adversarial Against Convolutional Neural Networks: Efficiency and Filter Robustness

30. ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks

31. Probabilistic Jacobian-Based Saliency Maps Attacks

32. AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models

33. Robust face recognition: How much face is needed?

34. SpacePhish

35. Systematic Literature Review of the Adversarial Attacks on AI in Cyber-Physical Systems

36. Adversarial attacks on fingerprint liveness detection

37. AI can turn the clock back before we know it

38. Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks

39. Universal Adversarial Attack via Conditional Sampling for Text Classification

40. Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks

41. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors

42. Towards Adversarial Attacks for Clinical Document Classification

43. Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks

44. Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

45. R-SNN: An Analysis and Design Methodology for Robustifying Spiking Neural Networks against Adversarial Attacks through Noise Filters for Dynamic Vision Sensors

46. Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

47. Adversarial Training for Deep Learning-based Intrusion Detection Systems

48. Universal Spectral Adversarial Attacks for Deformable Shapes

49. Experimental assessment of аdversarial attacks to the deep neural networks in medical image recognition

50. DDSA: A Defense Against Adversarial Attacks Using Deep Denoising Sparse Autoencoder