Search

Showing total 108 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks Publication Year Range This year Remove constraint Publication Year Range: This year
108 results

Search Results

1. A Deep Dive into Deep Learning-Based Adversarial Attacks and Defenses in Computer Vision: From a Perspective of Cybersecurity

2. Making Domain Specific Adversarial Attacks for Retinal Fundus Images

3. An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

4. On Real-Time Model Inversion Attacks Detection

5. Gradient Aggregation Boosting Adversarial Examples Transferability Method.

7. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

8. RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis.

9. Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection.

10. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

11. 图神经网络对抗攻击与鲁棒性评测前沿进展.

13. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

14. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

15. Effectiveness of machine learning based android malware detectors against adversarial attacks.

16. Dealing with the unevenness: deeper insights in graph-based attack and defense.

17. Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study.

18. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

19. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

20. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

21. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

22. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

23. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

28. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models.

29. Vulnerability issues in Automatic Speaker Verification (ASV) systems

30. Enhancing Security in Real-Time Video Surveillance: A Deep Learning-Based Remedial Approach for Adversarial Attack Mitigation

33. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

34. A dilution-based defense method against poisoning attacks on deep learning systems.

35. State-of-the-art optical-based physical adversarial attacks for deep learning computer vision systems.

36. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks

37. Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models.

38. Mitigating Adversarial Attacks against IoT Profiling.

48. Adversarial Attacks on Large Language Models

49. Different Attack and Defense Types for AI Cybersecurity

50. Adversarial-Robust Transfer Learning for Medical Imaging via Domain Assimilation