Search

Showing total 538 results

Search Constraints

Start Over You searched for: Topic adversarial attacks Remove constraint Topic: adversarial attacks
538 results

Search Results

1. A Deep Dive into Deep Learning-Based Adversarial Attacks and Defenses in Computer Vision: From a Perspective of Cybersecurity

2. Making Domain Specific Adversarial Attacks for Retinal Fundus Images

3. An Adversarial Robustness Benchmark for Enterprise Network Intrusion Detection

4. On Real-Time Model Inversion Attacks Detection

6. Towards Improving the Anti-attack Capability of the RangeNet++

7. Transformers in Unsupervised Structure-from-Motion

8. Adversarial Attacks and Mitigations on Scene Segmentation of Autonomous Vehicles

9. Improving the Transferability of Adversarial Attacks Through Both Front and Rear Vector Method

13. Two to Trust: AutoML for Safe Modelling and Interpretable Deep Learning for Robustness

14. Pixel Based Adversarial Attacks on Convolutional Neural Network Models

15. Performance Evaluation of Adversarial Attacks on Whole-Graph Embedding Models

16. Towards Evaluating the Robustness of Deep Intrusion Detection Models in Adversarial Environment

17. Influence of Control Parameters and the Size of Biomedical Image Datasets on the Success of Adversarial Attacks

18. : Defending Against Adversarial Attacks Using Statistical Hypothesis Testing

19. Can We Trust AI-Powered Real-Time Embedded Systems? (Invited Paper)

20. Gradient Aggregation Boosting Adversarial Examples Transferability Method.

21. Adversarial Training Methods for Deep Learning: A Systematic Review.

23. Vulnerability issues in Automatic Speaker Verification (ASV) systems.

24. RDMAA: Robust Defense Model against Adversarial Attacks in Deep Learning for Cancer Diagnosis.

25. Local Adaptive Gradient Variance Attack for Deep Fake Fingerprint Detection.

26. A Holistic Review of Machine Learning Adversarial Attacks in IoT Networks.

27. 图神经网络对抗攻击与鲁棒性评测前沿进展.

28. Low-Pass Image Filtering to Achieve Adversarial Robustness.

30. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

31. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

32. Effectiveness of machine learning based android malware detectors against adversarial attacks.

33. Dealing with the unevenness: deeper insights in graph-based attack and defense.

34. Evaluating the Efficacy of Latent Variables in Mitigating Data Poisoning Attacks in the Context of Bayesian Networks: An Empirical Study.

35. Evaluating Realistic Adversarial Attacks against Machine Learning Models for Windows PE Malware Detection.

36. Not So Robust after All: Evaluating the Robustness of Deep Neural Networks to Unseen Adversarial Attacks.

37. FedDAA: a robust federated learning framework to protect privacy and defend against adversarial attack.

38. An Ontological Knowledge Base of Poisoning Attacks on Deep Neural Networks.

39. Detecting and Isolating Adversarial Attacks Using Characteristics of the Surrogate Model Framework.

40. Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation.

41. Maxwell's Demon in MLP-Mixer: towards transferable adversarial attacks.

42. Robustness and Transferability of Adversarial Attacks on Different Image Classification Neural Networks.

43. A Review of Generative Models in Generating Synthetic Attack Data for Cybersecurity.

44. Towards Resilient and Secure Smart Grids against PMU Adversarial Attacks: A Deep Learning-Based Robust Data Engineering Approach.

45. Deceptive Tricks in Artificial Intelligence: Adversarial Attacks in Ophthalmology.

47. Adversarial attacks against mouse- and keyboard-based biometric authentication: black-box versus domain-specific techniques.

48. Reconstruction-Based Adversarial Attack Detection in Vision-Based Autonomous Driving Systems.

49. Improving Adversarial Robustness via Distillation-Based Purification.

50. Structure Estimation of Adversarial Distributions for Enhancing Model Robustness: A Clustering-Based Approach.