Search

Showing total 374 results

Search Constraints

Start Over You searched for: Search Limiters Academic (Peer-Reviewed) Journals Remove constraint Search Limiters: Academic (Peer-Reviewed) Journals Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
374 results

Search Results

1. Adversarial Training Methods for Deep Learning: A Systematic Review.

3. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

4. RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis.

5. Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection.

6. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

7. 图神经网络对抗攻击与鲁棒性评测前沿进展.

8. Low-Pass Image Filtering to Achieve Adversarial Robustness.

10. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

11. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

12. Effectiveness of machine learning based android malware detectors against adversarial attacks.

13. Dealing with the unevenness: deeper insights in graph-based attack and defense.

14. Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study.

15. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

16. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

17. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

18. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

19. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework.

20. Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation.

21. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

22. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

23. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

24. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach.

25. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

27. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

28. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems.

29. Improving Adversarial Robustness via Distillation-Based Purification.

30. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach.

31. On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective.

34. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.

35. Neural Adversarial Attacks with Random Noises.

36. Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks.

37. Face Recognition System Against Adversarial Attack Using Convolutional Neural Network.

38. Adversarial learning techniques for security and privacy preservation: A comprehensive review.

39. A robust hybrid digital watermarking technique against a powerful CNN-based adversarial attack.

43. A Novel Deep Fuzzy Classifier by Stacking Adversarial Interpretable TSK Fuzzy Sub-Classifiers With Smooth Gradient Information.

44. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models.

45. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).

46. Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications.

47. Adversarial attacks on graph-level embedding methods: a case study.

48. Learning key steps to attack deep reinforcement learning agents.

49. Fooling the Big Picture in Classification Tasks.