Search

Showing total 66 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years Publisher springer nature Remove constraint Publisher: springer nature
66 results

Search Results

1. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

2. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

3. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

4. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

5. Effectiveness of machine learning based android malware detectors against adversarial attacks.

6. Dealing with the unevenness: deeper insights in graph-based attack and defense.

7. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

8. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

9. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

10. TRIESTE: translation based defense for text classifiers.

11. Generating adversarial samples by manipulating image features with auto-encoder.

12. A robust hybrid digital watermarking technique against a powerful CNN-based adversarial attack.

13. Adversarial attacks on graph-level embedding methods: a case study.

14. Learning key steps to attack deep reinforcement learning agents.

15. Fooling the Big Picture in Classification Tasks.

16. On the robustness of vision transformers for in-flight monocular depth estimation.

17. Empiricism in the foundations of cognition.

18. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks.

19. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

20. Adversarial examples for extreme multilabel text classification.

21. Evaluation of adversarial attacks sensitivity of classifiers with occluded input data.

22. Adversarial example detection for DNN models: a review and experimental comparison.

23. Adversarial attacks on fingerprint liveness detection.

24. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

25. A perspective on human activity recognition from inertial motion data.

26. Attack-Resistant and Efficient Cancelable Codeword Generation Using Random walk-Based Methods.

27. A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems.

28. RNAS-CL: Robust Neural Architecture Search by Cross-Layer Knowledge Distillation.

29. Machine learning security and privacy: a review of threats and countermeasures.

30. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

31. 3DVerifier: efficient robustness verification for 3D point cloud models.

32. Defense against adversarial attacks: robust and efficient compressed optimized neural networks.

33. Untargeted white-box adversarial attack to break into deep learning based COVID-19 monitoring face mask detection system.

34. Robust Federated Learning for execution time-based device model identification under label-flipping attack.

35. Clustering-based attack detection for adversarial reinforcement learning.

36. Towards the transferable audio adversarial attack via ensemble methods.

37. Vulnerable point detection and repair against adversarial attacks for convolutional neural networks.

38. Adversarial machine learning phases of matter.

39. Exploring misclassifications of robust neural networks to enhance adversarial attacks.

40. Detection of Iterative Adversarial Attacks via Counter Attack.

41. Towards the universal defense for query-based audio adversarial attacks on speech recognition system.

42. Towards adversarial realism and robust learning for IoT intrusion detection and classification.

43. Evil vs evil: using adversarial examples to against backdoor attack in federated learning.

44. Minimally Distorted Structured Adversarial Attacks.

45. Generate adversarial examples by adaptive moment iterative fast gradient sign method.

46. Revisiting model's uncertainty and confidences for adversarial example detection.

47. Understanding deep learning defenses against adversarial examples through visualizations for dynamic risk assessment.

48. Just noticeable difference for machine perception and generation of regularized adversarial images with minimal perturbation.

49. FATALRead - Fooling visual speech recognition models: Put words on Lips.

50. Poisoning attacks against knowledge graph-based recommendation systems using deep reinforcement learning.