Search

Your search keyword '"ai security"' showing total 99 results

Search Constraints

Start Over You searched for: Descriptor "ai security" Remove constraint Descriptor: "ai security" Publication Year Range Last 50 years Remove constraint Publication Year Range: Last 50 years
99 results on '"ai security"'

Search Results

1. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure

2. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure.

3. Sparse Backdoor Attack Against Neural Networks.

4. VFLIP: A Backdoor Defense for Vertical Federated Learning via Identification and Purification

5. DFaP: Data Filtering and Purification Against Backdoor Attacks

7. A Primer on Generative Artificial Intelligence.

8. Locality-Based Action-Poisoning Attack against the Continuous Control of an Autonomous Driving Model.

9. A Global Object Disappearance Attack Scenario on Object Detection

10. REN-A.I.: A Video Game for AI Security Education Leveraging Episodic Memory

11. Channel-augmented joint transformation for transferable adversarial attacks.

12. FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems

13. AFLOW: Developing Adversarial Examples Under Extremely Noise-Limited Settings

14. Defending Against Backdoor Attacks by Layer-wise Feature Analysis

15. Detecting and Mitigating Backdoor Attacks with Dynamic and Invisible Triggers

16. An interpretability security framework for intelligent decision support systems based on saliency map.

17. Privacy preserving for AI-based 3D human pose recovery and retargeting.

18. Toward a Comprehensive Framework for Ensuring Security and Privacy in Artificial Intelligence.

19. 基于样本分布特征的数据投毒防御.

20. Adaptive Backdoor Attack against Deep Neural Networks.

21. CANARY: An Adversarial Robustness Evaluation Platform for Deep Learning Models on Image Classification.

22. FMSA: a meta-learning framework-based fast model stealing attack technique against intelligent network intrusion detection systems.

23. Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.

24. Backdoor Attack against Face Sketch Synthesis.

25. Formulating Cybersecurity Requirements for Autonomous Ships Using the SQUARE Methodology.

26. An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks

28. Query-Efficient Black-Box Adversarial Attack with Random Pattern Noises

29. Defending Against Data Poisoning Attacks: From Distributed Learning to Federated Learning.

30. Adversarial Example Generation Method Based on Sensitive Features.

31. An Understanding of the Vulnerability of Datasets to Disparate Membership Inference Attacks.

32. TranFuzz: An Ensemble Black-Box Attack Framework Based on Domain Adaptation and Fuzzing

33. Privacy Protection Framework for Credit Data in AI

34. An Overview of Backdoor Attacks Against Deep Neural Networks and Possible Defences

35. Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems.

36. A Cascade Defense Method for Multidomain Adversarial Attacks under Remote Sensing Detection.

37. Backdoor attacks in federated learning with regression

38. Using side-channel and quantization vulnerability to recover DNN weights

39. Backdoor Attack against Face Sketch Synthesis

40. Formulating Cybersecurity Requirements for Autonomous Ships Using the SQUARE Methodology

41. LinkBreaker: Breaking the Backdoor-Trigger Link in DNNs via Neurons Consistency Check.

42. VulnerGAN: a backdoor attack through vulnerability amplification against machine learning-based network intrusion detection systems.

43. 5G 專網於 O-RAN 架構下的通訊資安發展趨勢.

44. Improving the transferability of adversarial examples through neighborhood attribution.

45. FDNet: Imperceptible backdoor attacks via frequency domain steganography and negative sampling.

46. Hierarchical hardware trojan for LUT‐based AI devices and its evaluation.

47. Robustness Analysis on Natural Language Processing Based AI Q&A Robots

48. Robust Adversarial Attack Against Explainable Deep Classification Models Based on Adversarial Images With Different Patch Sizes and Perturbation Ratios

49. Wireless Communications for Data Security: Efficiency Assessment of Cybersecurity Industry—A Promising Application for UAVs

50. APE-GAN++: An Improved APE-GAN to Eliminate Adversarial Perturbations.

Catalog

Books, media, physical & digital resources