Search

Your search keyword '"adversarial attacks"' showing total 1,134 results

Search Constraints

Start Over You searched for: Descriptor "adversarial attacks" Remove constraint Descriptor: "adversarial attacks"
1,134 results on '"adversarial attacks"'

Search Results

1. Using My Artistic Style? You Must Obtain My Authorization

3. Invisibility Spell: Adversarial Patch Attack Against Object Detectors

4. Adversarial Training of Logistic Regression Classifiers for Weather Prediction Against Poison and Evasion Attacks

5. GUARDIAN: Guarding Against Uncertainty and Adversarial Risks in Robot-Assisted Surgeries

6. FLAT: Flux-Aware Imperceptible Adversarial Attacks on 3D Point Clouds

7. Securing AGI: Collaboration, Ethics, and Policy for Responsible AI Development

9. A3GT: An Adaptive Asynchronous Generalized Adversarial Training Method.

10. Fast encryption of color medical videos for Internet of Medical Things.

11. Bidirectional Corrective Model-Contrastive Federated Adversarial Training.

12. Study on relationship between adversarial texts and language errors: a human-computer interaction perspective.

13. A Reliable Approach for Generating Realistic Adversarial Attack via Trust Region-Based Optimization.

14. Exploiting smartphone defence: a novel adversarial malware dataset and approach for adversarial malware detection.

15. X-Detect: explainable adversarial patch detection for object detectors in retail.

16. 针对电力 CPS 数据驱动算法对抗攻击的防御方法.

17. Securing online integrity: a hybrid approach to deepfake detection and removal using Explainable AI and Adversarial Robustness Training

18. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure

19. How to Defend and Secure Deep Learning Models Against Adversarial Attacks in Computer Vision: A Systematic Review.

20. Adversarial attacks and defenses for digital communication signals identification

21. IRADA: integrated reinforcement learning and deep learning algorithm for attack detection in wireless sensor networks.

22. Exploring adversarial examples and adversarial robustness of convolutional neural networks by mutual information.

23. Low rate hippocampal delay period activity encodes behavioral experience.

24. Non-Alpha-Num: a novel architecture for generating adversarial examples for bypassing NLP-based clickbait detection mechanisms.

25. Generation and Countermeasures of adversarial examples on vision: a survey.

26. 图神经网络对抗攻击与鲁棒性评测前沿进展.

27. Hybrid encryption based on a generative adversarial network.

28. Medical images under tampering.

29. Security in Transformer Visual Trackers: A Case Study on the Adversarial Robustness of Two Models.

30. Gradient Aggregation Boosting Adversarial Examples Transferability Method.

31. Defending Adversarial Attacks Against ASV Systems Using Spectral Masking.

33. The accelerated integration of artificial intelligence systems and its potential to expand the vulnerability of the critical infrastructure.

34. Mitigating Adversarial Attacks against IoT Profiling.

35. Instance-level Adversarial Source-free Domain Adaptive Person Re-identification.

36. A Novel Dataset and Approach for Adversarial Attack Detection in Connected and Automated Vehicles.

37. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.

38. Effectiveness of machine learning based android malware detectors against adversarial attacks.

39. A Survey of Adversarial Attacks: An Open Issue for Deep Learning Sentiment Analysis Models.

40. A Pilot Study of Observation Poisoning on Selective Reincarnation in Multi-Agent Reinforcement Learning.

41. Cheating Automatic Short Answer Grading with the Adversarial Usage of Adjectives and Adverbs.

42. Evasive attacks against autoencoder-based cyberattack detection systems in power systems

44. Challenging the Robustness of Image Registration Similarity Metrics with Adversarial Attacks

45. Security Assessment of Hierarchical Federated Deep Learning

46. Evaluating Port Emissions Prediction Model Resilience Against Cyberthreats

47. On the Effect of Quantization on Deep Neural Networks Performance

48. The Adversarial AI-Art: Understanding, Generation, Detection, and Benchmarking

49. A Theoretically Grounded Extension of Universal Attacks from the Attacker’s Viewpoint

50. Linear Modeling of the Adversarial Noise Space

Catalog

Books, media, physical & digital resources