Search

Showing total 25 results

Search Constraints

Start Over You searched for: Search Limiters Available in Library Collection Remove constraint Search Limiters: Available in Library Collection Topic adversarial attacks Remove constraint Topic: adversarial attacks Publisher springer nature Remove constraint Publisher: springer nature
25 results

Search Results

1. Fast encryption of color medical videos for Internet of Medical Things.

2. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

3. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

4. Generating adversarial samples by manipulating image features with auto-encoder.

5. Fooling the Big Picture in Classification Tasks.

6. On the robustness of vision transformers for in-flight monocular depth estimation.

7. Empiricism in the foundations of cognition.

8. Adversarial attacks on fingerprint liveness detection.

9. RNAS-CL: Robust Neural Architecture Search by Cross-Layer Knowledge Distillation.

10. Machine learning security and privacy: a review of threats and countermeasures.

11. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

12. Defense against adversarial attacks: robust and efficient compressed optimized neural networks.

13. Clustering-based attack detection for adversarial reinforcement learning.

14. Towards the transferable audio adversarial attack via ensemble methods.

15. Vulnerable point detection and repair against adversarial attacks for convolutional neural networks.

16. Adversarial machine learning phases of matter.

17. Exploring misclassifications of robust neural networks to enhance adversarial attacks.

18. Towards the universal defense for query-based audio adversarial attacks on speech recognition system.

19. Generate adversarial examples by adaptive moment iterative fast gradient sign method.

20. Revisiting model's uncertainty and confidences for adversarial example detection.

21. Minimally Distorted Structured Adversarial Attacks.

22. FATALRead - Fooling visual speech recognition models: Put words on Lips.

23. Robustifying Deep Networks for Medical Image Segmentation.

24. RoCGAN: Robust Conditional GAN.

25. Scaling up the Randomized Gradient-Free Adversarial Attack Reveals Overestimation of Robustness Using Established Attacks.