Search

Showing total 67 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Type Academic Journals Remove constraint Publication Type: Academic Journals Publisher springer nature Remove constraint Publisher: springer nature
67 results

Search Results

1. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

2. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

3. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

4. Effectiveness of machine learning based android malware detectors against adversarial attacks.

5. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

6. Dealing with the unevenness: deeper insights in graph-based attack and defense.

7. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

8. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

9. TRIESTE: translation based defense for text classifiers.

10. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

11. A perspective on human activity recognition from inertial motion data.

12. Generating adversarial samples by manipulating image features with auto-encoder.

13. A robust hybrid digital watermarking technique against a powerful CNN-based adversarial attack.

14. Adversarial attacks on graph-level embedding methods: a case study.

15. Learning key steps to attack deep reinforcement learning agents.

16. Fooling the Big Picture in Classification Tasks.

17. On the robustness of vision transformers for in-flight monocular depth estimation.

18. Empiricism in the foundations of cognition.

19. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

20. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks.

21. Adversarial examples for extreme multilabel text classification.

22. Evaluation of adversarial attacks sensitivity of classifiers with occluded input data.

23. Adversarial example detection for DNN models: a review and experimental comparison.

24. Adversarial attacks on fingerprint liveness detection.

25. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

26. Attack-Resistant and Efficient Cancelable Codeword Generation Using Random walk-Based Methods.

27. A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems.

28. RNAS-CL: Robust Neural Architecture Search by Cross-Layer Knowledge Distillation.

29. Machine learning security and privacy: a review of threats and countermeasures.

30. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

31. 3DVerifier: efficient robustness verification for 3D point cloud models.

32. Defense against adversarial attacks: robust and efficient compressed optimized neural networks.

33. Unlocking adversarial transferability: a security threat towards deep learning-based surveillance systems via black box inference attack- a case study on face mask surveillance.

34. Untargeted white-box adversarial attack to break into deep learning based COVID-19 monitoring face mask detection system.

35. Clustering-based attack detection for adversarial reinforcement learning.

36. Robust Federated Learning for execution time-based device model identification under label-flipping attack.

37. Towards the transferable audio adversarial attack via ensemble methods.

38. Vulnerable point detection and repair against adversarial attacks for convolutional neural networks.

39. Adversarial machine learning phases of matter.

40. Detection of Iterative Adversarial Attacks via Counter Attack.

41. Exploring misclassifications of robust neural networks to enhance adversarial attacks.

42. Towards the universal defense for query-based audio adversarial attacks on speech recognition system.

43. Towards adversarial realism and robust learning for IoT intrusion detection and classification.

44. Evil vs evil: using adversarial examples to against backdoor attack in federated learning.

45. Minimally Distorted Structured Adversarial Attacks.

46. Generate adversarial examples by adaptive moment iterative fast gradient sign method.

47. Revisiting model's uncertainty and confidences for adversarial example detection.

48. Understanding deep learning defenses against adversarial examples through visualizations for dynamic risk assessment.

49. Just noticeable difference for machine perception and generation of regularized adversarial images with minimal perturbation.

50. FATALRead - Fooling visual speech recognition models: Put words on Lips.