Search

Showing total 47 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years Publisher ieee Remove constraint Publisher: ieee
47 results

Search Results

1. A Novel Deep Fuzzy Classifier by Stacking Adversarial Interpretable TSK Fuzzy Sub-Classifiers With Smooth Gradient Information.

2. Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation

3. Divergence-Agnostic Unsupervised Domain Adaptation by Adversarial Attacks.

4. A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking.

5. Adversarial XAI Methods in Cybersecurity.

6. On the Algorithmic Solvability of Channel Dependent Classification Problems in Communication Systems.

7. On the Robustness of Semantic Segmentation Models to Adversarial Attacks.

8. Image Super-Resolution as a Defense Against Adversarial Attacks.

9. Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring

10. Adversarial Analysis for Source Camera Identification.

11. A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism

12. Adversarial Robustness of Vision Transformers Versus Convolutional Neural Networks

13. Adaptive Selection of Loss Function for Federated Learning Clients Under Adversarial Attacks

14. The Impact of Simultaneous Adversarial Attacks on Robustness of Medical Image Analysis

15. How Deep Learning Sees the World: A Survey on Adversarial Attacks & Defenses

16. Privacy and Security Concerns in Generative AI: A Comprehensive Survey

17. A Framework for Robust Deep Learning Models Against Adversarial Attacks Based on a Protection Layer Approach

18. SAAM: Stealthy Adversarial Attack on Monocular Depth Estimation

20. Privacy and Security in Distributed Learning: A Review of Challenges, Solutions, and Open Research Issues

21. Exploring Transferability on Adversarial Attacks

22. Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks

23. Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications

24. Detect Adversarial Attacks Against Deep Neural Networks With GPU Monitoring

25. Mitigating Malicious Adversaries Evasion Attacks in Industrial Internet of Things.

26. SIEMS: A Secure Intelligent Energy Management System for Industrial IoT Applications.

27. A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism

28. Distributed Attack-Robust Submodular Maximization for Multirobot Planning.

29. Turning Federated Learning Systems Into Covert Channels

30. A Methodology for Evaluating the Robustness of Anomaly Detectors to Adversarial Attacks in Industrial Scenarios

31. A Highly Stealthy Adaptive Decay Attack Against Speaker Recognition

32. A Survey on Efficient Methods for Adversarial Robustness

33. Robust Natural Language Processing: Recent Advances, Challenges, and Future Directions

34. Backpack: A Backpropagable Adversarial Embedding Scheme.

35. Adversarial Attacks Against Deep Learning-Based Network Intrusion Detection Systems and Defense Mechanisms.

36. Adversarial Attacks on Neural-Network-Based Soft Sensors: Directly Attack Output.

37. Certifiable Robustness to Adversarial State Uncertainty in Deep Reinforcement Learning.

38. Deep Learning-Based Autonomous Driving Systems: A Survey of Attacks and Defenses.

39. Noticeability Versus Impact in Traffic Signal Tampering

40. Study of Pre-Processing Defenses Against Adversarial Attacks on State-of-the-Art Speaker Recognition Systems.

41. The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection.

42. DDSA: A Defense Against Adversarial Attacks Using Deep Denoising Sparse Autoencoder

43. DetectX—Adversarial Input Detection Using Current Signatures in Memristive XBar Arrays.

44. Adversarial Deep Learning for Over-the-Air Spectrum Poisoning Attacks.

45. FCDM: A Methodology Based on Sensor Pattern Noise Fingerprinting for Fast Confidence Detection to Adversarial Attacks.

46. Evolutionary Algorithm-Based Images, Humanly Indistinguishable and Adversarial Against Convolutional Neural Networks: Efficiency and Filter Robustness

47. AI can turn the clock back before we know it