Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective
Wang, Jianhua, Lei, Xuyang, Liang, Min, Misic, Jelena, Misic, Vojislav B., Chang, Xiaolin
Published in IEEE International Conference on Communications (2003) (09.06.2024)
Published in IEEE International Conference on Communications (2003) (09.06.2024)
Get full text
Conference Proceeding
Artificial Intelligence Security: Threats and Countermeasures
Hu, Yupeng, Kuang, Wenxin, Qin, Zheng, Li, Kenli, Zhang, Jiliang, Gao, Yansong, Li, Wenjia, Li, Keqin
Published in ACM computing surveys (31.01.2023)
Published in ACM computing surveys (31.01.2023)
Get full text
Journal Article
Multi-Spectral Palmprints joint Attack and Defense with Adversarial Examples Learning
Zhu, Qi, Zhou, Yuze, Fei, Lunke, Zhang, Daoqiang, Zhang, David
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
An Adversarial Example Generation Method Based on Mask Extraction
Li, Mingzhe, Liu, Jieyi, Lin, Zixuan, Yang, Yaoming, Zou, Yutong, Zhou, Yu
Published in 2024 8th Asian Conference on Artificial Intelligence Technology (ACAIT) (08.11.2024)
Published in 2024 8th Asian Conference on Artificial Intelligence Technology (ACAIT) (08.11.2024)
Get full text
Conference Proceeding
ApaNet: adversarial perturbations alleviation network for face verification
Sun, Guangling, Hu, Haoqi, Su, Yuying, Liu, Qi, Lu, Xiaofeng
Published in Multimedia tools and applications (01.02.2023)
Published in Multimedia tools and applications (01.02.2023)
Get full text
Journal Article
AaceGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models
Li, Zhong, Zhang, Chong, Pan, Minxue, Zhang, Tian, Li, Xuandong
Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)
Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)
Get full text
Conference Proceeding
Non-Singular Adversarial Robustness of Neural Networks
Tsai, Yu-Lin, Hsu, Chia-Yi, Yu, Chia-Mu, Chen, Pin-Yu
Published in Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) (06.06.2021)
Published in Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) (06.06.2021)
Get full text
Conference Proceeding
Enhancing the Robustness of Deep Neural Networks from "Smart" Compression
Tao Liu, Zihao Liu, Qi Liu, Wujie Wen
Published in 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (01.07.2018)
Published in 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (01.07.2018)
Get full text
Conference Proceeding
Improvement of Detection Accuracy for Calcification Regions in Dental Panoramic Radiographs Using LVAT
Ikeda, Naoki, Takano, Sei, Muneyasu, Mitsuji, Yoshida, Soh, Asano, Akira, Dewake, Nanae, Yoshinari, Nobuo, Uchida, Keiichi
Published in Annual Conference for Protective Relay Engineers : [proceedings] (10.12.2024)
Published in Annual Conference for Protective Relay Engineers : [proceedings] (10.12.2024)
Get full text
Conference Proceeding
Adversarial Text-Based CAPTCHA Generation Method Utilizing Spatial Smoothing
Matsuura, Yuichiro, Kato, Hiroya, Sasase, Iwao
Published in 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)
Published in 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)
Get full text
Conference Proceeding
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
Chen, Jiming, Gao, Xiangshan, Deng, Ruilong, He, Yang, Fang, Chongrong, Cheng, Peng
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples
Yuan, Zihan, Zhang, Xinpeng, Wang, Zichi, Yin, Zhaoxia
Published in IEEE transactions on emerging topics in computational intelligence (01.08.2024)
Published in IEEE transactions on emerging topics in computational intelligence (01.08.2024)
Get full text
Journal Article
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Demetrio, Luca, Coull, Scott E., Biggio, Battista, Lagorio, Giovanni, Armando, Alessandro, Roli, Fabio
Published in ACM transactions on privacy and security (01.11.2021)
Published in ACM transactions on privacy and security (01.11.2021)
Get full text
Journal Article