Search

Showing total 49 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years Publisher mdpi Remove constraint Publisher: mdpi
49 results

Search Results

1. Adversarial Training Methods for Deep Learning: A Systematic Review.

2. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

3. Low-Pass Image Filtering to Achieve Adversarial Robustness.

4. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

5. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

6. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

7. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework.

8. Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation.

9. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

10. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

11. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach.

12. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

13. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems.

14. Improving Adversarial Robustness via Distillation-Based Purification.

15. On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective.

16. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach.

17. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.

18. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models.

19. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS).

20. Detection of Adversarial Attacks against the Hybrid Convolutional Long Short-Term Memory Deep Learning Technique for Healthcare Monitoring Applications.

21. Review of the Data-Driven Methods for Electricity Fraud Detection in Smart Metering Systems.

22. ShuffleDetect: Detecting Adversarial Images against Convolutional Neural Networks.

23. Adversarial Machine Learning Attacks against Intrusion Detection Systems: A Survey on Strategies and Defense.

24. RSMDA: Random Slices Mixing Data Augmentation.

25. Detection of SQL Injection Attack Using Machine Learning Techniques: A Systematic Literature Review.

26. Model and Training Method of the Resilient Image Classifier Considering Faults, Concept Drift, and Adversarial Attacks.

27. Adversarial Robust and Explainable Network Intrusion Detection Systems Based on Deep Learning.

28. AT-BOD: An Adversarial Attack on Fool DNN-Based Blackbox Object Detection Models.

29. Universal Adversarial Attack via Conditional Sampling for Text Classification.

30. Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models.

31. Mitigating Adversarial Attacks against IoT Profiling.

32. A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles.

33. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.

34. Analysis of Federated Learning Paradigm in Medical Domain: Taking COVID-19 as an Application Use Case.

35. TXAI-ADV: Trustworthy XAI for Defending AI Models against Adversarial Attacks in Realistic CIoT.

36. RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.

37. Adversarial Attacks on Medical Segmentation Model via Transformation of Feature Statistics.

38. CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering.

39. Exploring Adversarial Robustness of LiDAR Semantic Segmentation in Autonomous Driving.

40. CamoNet: A Target Camouflage Network for Remote Sensing Images Based on Adversarial Attack.

41. Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks.

42. PSI Analysis of Adversarial-Attacked DCNN Models.

43. Adversarial Attack and Defense in Breast Cancer Deep Learning Systems.

44. Towards Adversarial Robustness for Multi-Mode Data through Metric Learning.

45. DDSG-GAN: Generative Adversarial Network with Dual Discriminators and Single Generator for Black-Box Attacks.

46. Empirical Perturbation Analysis of Two Adversarial Attacks: Black Box versus White Box.

47. Adversarial Attack and Defense Strategies of Speaker Recognition Systems: A Survey.

48. GANBA: Generative Adversarial Network for Biometric Anti-Spoofing.

49. Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks