Search

Showing total 309 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 10 years Remove constraint Publication Year Range: Last 10 years
309 results

Search Results

1. Adversarial Training Methods for Deep Learning: A Systematic Review.

2. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

3. RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis.

4. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

5. 图神经网络对抗攻击与鲁棒性评测前沿进展.

6. Low-Pass Image Filtering to Achieve Adversarial Robustness.

7. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

8. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

9. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

10. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework.

11. Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation.

12. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

13. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

14. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

15. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach.

16. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

17. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems.

18. Improving Adversarial Robustness via Distillation-Based Purification.

19. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach.

20. On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective.

22. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.

23. Neural Adversarial Attacks with Random Noises.

24. Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks.

25. Face Recognition System Against Adversarial Attack Using Convolutional Neural Network.

27. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models.

28. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).

29. Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications.

30. Fooling the Big Picture in Classification Tasks.

32. On the robustness of vision transformers for in-flight monocular depth estimation.

33. ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks.

34. Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems.

35. RSMDA: Random Slices Mixing Data Augmentation.

36. Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense.

37. An Optimised Defensive Technique to Recognize Adversarial Iris Images Using Curvelet Transform.

38. Vulnerability issues in Automatic Speaker Verification (ASV) systems

39. Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation

40. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review.

41. Divergence-Agnostic Unsupervised Domain Adaptation by Adversarial Attacks.

42. Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks.

43. State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.

44. A Study of Adversarial Attacks and Detection on Deep Learning-Based Plant Disease Identification.

45. Transferability analysis of adversarial attacks on gender classification to face recognition: Fixed and variable attack perturbation.

46. Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning.

47. Adversarial attacks on fingerprint liveness detection.

48. A Simple and Strong Baseline for Universal Targeted Attacks on Siamese Visual Tracking.

49. AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models.

50. SCOPING ADVERSARIAL ATTACK FOR IMPROVING ITS QUALITY.