Search

Showing total 345 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
345 results

Search Results

301. Adversarial attacks and active defense on deep learning based identification of GaN power amplifiers under physical perturbation

302. SIEMS:A Secure Intelligent Energy Management System for Industrial IoT applications

303. Adversarial Attacks and Defense Technologies on Autonomous Vehicles: A Review

304. Adversarial Deep Learning approach detection and defense against DDoS attacks in SDN environments

305. An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm

306. Effectiveness of the Execution and Prevention of Metric-Based Adversarial Attacks on Social Network Data †

307. SIT: Stochastic Input Transformation to Defend Against Adversarial Attacks on Deep Neural Networks

308. Adversarial attacks and defenses in Speaker Recognition Systems

309. RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning

310. The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks

311. Evolutionary Algorithm-Based Images, Humanly Indistinguishable and Adversarial Against Convolutional Neural Networks: Efficiency and Filter Robustness

312. Multivariate Lipschitz Analysis of the Stability of Neural Networks

313. Adversarial attacks on fingerprint liveness detection

314. Robust face recognition: How much face is needed?

315. SpacePhish

316. Systematic Literature Review of the Adversarial Attacks on AI in Cyber-Physical Systems

317. AI can turn the clock back before we know it

318. Towards Adversarial Attacks for Clinical Document Classification

319. Lower Voltage for Higher Security: Using Voltage Overscaling to Secure Deep Neural Networks

320. Universal Adversarial Attack via Conditional Sampling for Text Classification

321. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors

322. Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

323. R-SNN: An Analysis and Design Methodology for Robustifying Spiking Neural Networks against Adversarial Attacks through Noise Filters for Dynamic Vision Sensors

324. Defense against adversarial attacks on deep convolutional neural networks through nonlocal denoising

325. Adversarial Training for Deep Learning-based Intrusion Detection Systems

326. Universal Spectral Adversarial Attacks for Deformable Shapes

327. On the robustness of randomized classifiers to adversarial examples

328. A Study of Adversarial Attacks and Detection on Deep Learning-Based Plant Disease Identification

329. Defending Neural ODE Image Classifiers from Adversarial Attacks with Tolerance Randomization

330. Two to Trust: AutoML for Safe Modelling and Interpretable Deep Learning for Robustness

331. Laplacian networks: bounding indicator function smoothness for neural networks robustness

332. Analysis of Security of Machine Learning and a proposition of assessment pattern to deal with adversarial attacks

333. Securing Deep Spiking Neural Networks against Adversarial Attacks through Inherent Structural Parameters

334. Tiki-Taka

335. Universal Adversarial Attacks on Spoken Language Assessment Systems

336. Neuroattack: undermining spiking neural networks security through externally triggered bit-flips

337. Adversarial examples in Android malware detection

338. Effectiveness of the Execution and Prevention of Metric-Based Adversarial Attacks on Social Network Data

339. Minimalistic attacks : how little it takes to fool deep reinforcement learning policies

340. Noticeability Versus Impact in Traffic Signal Tampering

341. A machine learning based approach to detect malicious android apps using discriminant system calls

342. The Next Generation Cognitive Security Operations Center: Adaptive Analytic Lambda Architecture for Efficient Defense against Adversarial Attacks

343. MARGIN: Uncovering Deep Neural Networks using Graph Signal Analysis

344. Defense-GAN per a text: protegint classificadors de text davant dels coneguts com a atacs adversos

345. Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems