79 results
Search Results
2. A Deep Dive into Deep Learning-Based Adversarial Attacks and Defenses in Computer Vision: From a Perspective of Cybersecurity
3. Making Domain Specific Adversarial Attacks for Retinal Fundus Images
4. An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection
5. On Real-Time Model Inversion Attacks Detection
6. On Effectiveness of the Adversarial Attacks on the Computer Systems of Biomedical Images Classification
7. Towards Improving the Anti-attack Capability of the RangeNet++
8. Transformers in Unsupervised Structure-from-Motion
9. Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles
10. Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method
11. Detect & Reject for Transferability of Black-Box Adversarial Attacks Against Network Intrusion Detection Systems
12. Trust-Based Adversarial Resiliency in Vehicular Cyber Physical Systems Using Reinforcement Learning
13. Deep Neural Network Based Malicious Network Activity Detection Under Adversarial Machine Learning Attacks
14. Two to Trust: AutoML for Safe Modelling and Interpretable Deep Learning for Robustness
15. Pixel Based Adversarial Attacks on Convolutional Neural Network Models
16. Performance Evaluation of Adversarial Attacks on Whole-Graph Embedding Models
17. Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment
18. Influence of Control Parameters and the Size of Biomedical Image Datasets on the Success of Adversarial Attacks
19. : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing
20. Adversarial Training of Logistic Regression Classifiers for Weather Prediction Against Poison and Evasion Attacks
21. FLAT: Flux-Aware Imperceptible Adversarial Attacks on 3D Point Clouds
22. Research on Neural Network Defense Problem Based on Random Noise Injection
23. Towards Explaining Shortcut Learning Through Attention Visualization and Adversarial Attacks
24. Evaluating Port Emissions Prediction Model Resilience Against Cyberthreats
25. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking
26. Adversarial Attacks on Large Language Models
27. Different Attack and Defense Types for AI Cybersecurity
28. Adversarial-Robust Transfer Learning for Medical Imaging via Domain Assimilation
29. A Comparative Analysis of Evolutionary Adversarial One-Pixel Attacks
30. Adversarial Attacks and Defenses in Capsule Networks: A Critical Review of Robustness Challenges and Mitigation Strategies
31. UnboundAttack: Generating Unbounded Adversarial Attacks to Graph Neural Networks
32. Deceiving Airborne Object Detectors Using Adversarial AI
33. SCME: A Self-contrastive Method for Data-Free and Query-Limited Model Extraction Attack
34. Research on Transferable Characteristics of Adversarial Examples Generated Based on Gradient Information
35. Attack and Fault Injection in Self-driving Agents on the Carla Simulator – Experience Report
36. Rethinking the Evaluation of Deep Neural Network Robustness
37. Unfooling SHAP and SAGE: Knockoff Imputation for Shapley Values
38. Reliable Aircraft Trajectory Prediction Using Autoencoder Secured with P2P Blockchain
39. Boosting Adversarial Transferability Through Intermediate Feature
40. Towards Robustness of Large Language Models on Text-to-SQL Task: An Adversarial and Cross-Domain Investigation
41. Data-Free Model Extraction Attacks in the Context of Object Detection
42. Neutralizing Adversarial Machine Learning in Industrial Control Systems Using Blockchain
43. Backdoor Mitigation in Deep Neural Networks via Strategic Retraining
44. Preventing Adversarial Attacks on Autonomous Driving Models
45. Attribution-Based Confidence Metric for Detection of Adversarial Attacks on Breast Histopathological Images
46. A Security-Oriented Architecture for Federated Learning in Cloud Environments
47. Risk Susceptibility of Brain Tumor Classification to Adversarial Attacks
48. Are Graph Neural Network Explainers Robust to Graph Noises?
49. Adversarial Robustness of MR Image Reconstruction Under Realistic Perturbations
50. Defense Against Adversarial Attacks Using Chained Dual-GAN Approach
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.