Search

Showing total 67 results

Search Constraints

Start Over You searched for: Search Limiters Peer Reviewed Remove constraint Search Limiters: Peer Reviewed Topic adversarial attacks Remove constraint Topic: adversarial attacks Publisher springer nature Remove constraint Publisher: springer nature
67 results

Search Results

1. Fast encryption of color medical videos for Internet of Medical Things.

2. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

3. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

4. Effectiveness of machine learning based android malware detectors against adversarial attacks.

5. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

6. Dealing with the unevenness: deeper insights in graph-based attack and defense.

7. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

8. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

9. TRIESTE: translation based defense for text classifiers.

10. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

11. A perspective on human activity recognition from inertial motion data.

12. A robust hybrid digital watermarking technique against a powerful CNN-based adversarial attack.

13. Generating adversarial samples by manipulating image features with auto-encoder.

14. Adversarial attacks on graph-level embedding methods: a case study.

15. Learning key steps to attack deep reinforcement learning agents.

16. Fooling the Big Picture in Classification Tasks.

17. On the robustness of vision transformers for in-flight monocular depth estimation.

18. A P4-Based Adversarial Attack Mitigation on Machine Learning Models in Data Plane Devices.

19. A Robust SNMP-MIB Intrusion Detection System Against Adversarial Attacks.

20. Empiricism in the foundations of cognition.

21. Adversarial examples for extreme multilabel text classification.

22. Evaluation of adversarial attacks sensitivity of classifiers with occluded input data.

23. Adversarial attacks on fingerprint liveness detection.

24. DNS exfiltration detection in the presence of adversarial attacks and modified exfiltrator behaviour.

25. Adversarial example detection for DNN models: a review and experimental comparison.

26. Attack-Resistant and Efficient Cancelable Codeword Generation Using Random walk-Based Methods.

27. A Novel Lightweight Defense Method Against Adversarial Patches-Based Attacks on Automated Vehicle Make and Model Recognition Systems.

28. RNAS-CL: Robust Neural Architecture Search by Cross-Layer Knowledge Distillation.

29. Machine learning security and privacy: a review of threats and countermeasures.

30. Analyzing the robustness of decentralized horizontal and vertical federated learning architectures in a non-IID scenario.

31. 3DVerifier: efficient robustness verification for 3D point cloud models.

32. Defense against adversarial attacks: robust and efficient compressed optimized neural networks.

33. Unlocking adversarial transferability: a security threat towards deep learning-based surveillance systems via black box inference attack- a case study on face mask surveillance.

34. Untargeted white-box adversarial attack to break into deep learning based COVID-19 monitoring face mask detection system.

35. Robust Federated Learning for execution time-based device model identification under label-flipping attack.

36. Clustering-based attack detection for adversarial reinforcement learning.

37. Towards the transferable audio adversarial attack via ensemble methods.

38. Vulnerable point detection and repair against adversarial attacks for convolutional neural networks.

39. Adversarial machine learning phases of matter.

40. Exploring misclassifications of robust neural networks to enhance adversarial attacks.

41. Detection of Iterative Adversarial Attacks via Counter Attack.

42. Towards the universal defense for query-based audio adversarial attacks on speech recognition system.

43. Towards adversarial realism and robust learning for IoT intrusion detection and classification.

44. Evil vs evil: using adversarial examples to against backdoor attack in federated learning.

45. Generate adversarial examples by adaptive moment iterative fast gradient sign method.

46. Revisiting model's uncertainty and confidences for adversarial example detection.

47. Minimally Distorted Structured Adversarial Attacks.

48. Understanding deep learning defenses against adversarial examples through visualizations for dynamic risk assessment.

49. Just noticeable difference for machine perception and generation of regularized adversarial images with minimal perturbation.

50. FATALRead - Fooling visual speech recognition models: Put words on Lips.