Search

Showing total 406 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 3 years Remove constraint Publication Year Range: Last 3 years
406 results

Search Results

1. A Deep Dive into Deep Learning-Based Adversarial Attacks and Defenses in Computer Vision: From a Perspective of Cybersecurity

2. Making Domain Specific Adversarial Attacks for Retinal Fundus Images

3. An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

4. On Real-Time Model Inversion Attacks Detection

6. Towards Improving the Anti-attack Capability of the RangeNet++

7. Transformers in Unsupervised Structure-from-Motion

8. Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles

9. Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method

10. Can We Trust AI-Powered Real-Time Embedded Systems? (Invited Paper)

11. Gradient Aggregation Boosting Adversarial Examples Transferability Method.

12. Adversarial Training Methods for Deep Learning: A Systematic Review.

14. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

15. RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis.

16. Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection.

17. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

18. 图神经网络对抗攻击与鲁棒性评测前沿进展.

19. Low-Pass Image Filtering to Achieve Adversarial Robustness.

21. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

22. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

23. Effectiveness of machine learning based android malware detectors against adversarial attacks.

24. Dealing with the unevenness: deeper insights in graph-based attack and defense.

25. Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study.

26. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

27. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

28. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

29. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

30. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework.

31. Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation.

32. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

33. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

34. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

35. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach.

36. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

38. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

39. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems.

40. Improving Adversarial Robustness via Distillation-Based Purification.

41. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach.

42. On the Robustness of ML-Based Network Intrusion Detection Systems: An Adversarial and Distribution Shift Perspective.

45. SGAN-IDS: Self-Attention-Based Generative Adversarial Network against Intrusion Detection Systems.

46. Neural Adversarial Attacks with Random Noises.

47. Secure Gait Recognition-Based Smart Surveillance Systems Against Universal Adversarial Attacks.

48. Face Recognition System Against Adversarial Attack Using Convolutional Neural Network.

49. Adversarial learning techniques for security and privacy preservation: A comprehensive review.