Search

Showing total 537 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
537 results

Search Results

201. On the robustness of skeleton detection against adversarial attacks.

202. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems

203. Method for testing NLP models with text adversarial examples

204. Perturbation analysis of gradient-based adversarial attacks.

205. VAASI: Crafting valid and abnormal adversarial samples for anomaly detection systems in industrial scenarios.

206. Brain programming is immune to adversarial attacks: Towards accurate and robust image classification using symbolic learning.

207. Towards the transferable audio adversarial attack via ensemble methods.

208. A Survey of Adversarial Defenses and Robustness in NLP.

209. Vulnerable point detection and repair against adversarial attacks for convolutional neural networks.

210. CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering.

211. Exploring Adversarial Robustness of LiDAR Semantic Segmentation in Autonomous Driving.

212. Adversarial machine learning phases of matter.

213. CamoNet: A Target Camouflage Network for Remote Sensing Images Based on Adversarial Attack.

214. VeriFace: Defending against Adversarial Attacks in Face Verification Systems.

215. Rethinking the Evaluation of Deep Neural Network Robustness

218. Boosting Adversarial Transferability Through Intermediate Feature

219. Towards Robustness of Large Language Models on Text-to-SQL Task: An Adversarial and Cross-Domain Investigation

220. Data-Free Model Extraction Attacks in the Context of Object Detection

222. Backdoor Mitigation in Deep Neural Networks via Strategic Retraining

223. Preventing Adversarial Attacks on Autonomous Driving Models

224. Attribution-Based Confidence Metric for Detection of Adversarial Attacks on Breast Histopathological Images

225. Developing future human-centered smart cities: Critical analysis of smart city security, Data management, and Ethical challenges.

226. Evaluating Neural Networks’ Ability to Generalize against Adversarial Attacks in Cross-Lingual Settings

227. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection

228. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks

229. RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning.

230. Adversarial attacks on deep-learning-based radar range profile target recognition.

231. Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks.

232. Bi-fidelity evolutionary multiobjective search for adversarially robust deep neural architectures.

233. One evolutionary algorithm deceives humans and ten convolutional neural networks trained on ImageNet at image recognition.

234. Universal backdoor attack on deep neural networks for malware detection.

235. Exploring misclassifications of robust neural networks to enhance adversarial attacks.

236. PSI Analysis of Adversarial-Attacked DCNN Models.

237. Multi‐aspects AI‐based modeling and adversarial learning for cybersecurity intelligence and robustness: A comprehensive overview.

238. Explainable and secure artificial intelligence: taxonomy, cases of study, learned lessons, challenges and future directions.

239. Towards the universal defense for query-based audio adversarial attacks on speech recognition system.

240. Towards adversarial realism and robust learning for IoT intrusion detection and classification.

241. Adversarial Attack and Defense in Breast Cancer Deep Learning Systems.

242. Medical Image Fusion Based on Anisotropic Diffusion and Non-Subsampled Contourlet Transform.

243. Towards Adversarial Robustness for Multi-Mode Data through Metric Learning.

244. Privacy and Security in Distributed Learning: A Review of Challenges, Solutions, and Open Research Issues

245. Exploring Transferability on Adversarial Attacks

246. Defending AI-Based Automatic Modulation Recognition Models Against Adversarial Attacks

247. Secure Convolutional Neural Network-Based Internet-of-Healthcare Applications

248. PrivacyMask: Real-world privacy protection in face ID systems

249. Sound classification using wavelet transformation and deep learning methods

250. On the vulnerability of deep learning to adversarial attacks for camera model identification.