Loading…
Towards Well-trained Model Robustness in Federated Learning: An Adversarial- Example-Generation- Efficiency Perspective
Wang, Jianhua, Lei, Xuyang, Liang, Min, Misic, Jelena, Misic, Vojislav B., Chang, Xiaolin
Published in IEEE International Conference on Communications (2003) (09.06.2024)
Published in IEEE International Conference on Communications (2003) (09.06.2024)
Get full text
Conference Proceeding
Loading…
Artificial Intelligence Security: Threats and Countermeasures
Hu, Yupeng, Kuang, Wenxin, Qin, Zheng, Li, Kenli, Zhang, Jiliang, Gao, Yansong, Li, Wenjia, Li, Keqin
Published in ACM computing surveys (31.01.2023)
Published in ACM computing surveys (31.01.2023)
Get full text
Journal Article
Loading…
Multi-Spectral Palmprints joint Attack and Defense with Adversarial Examples Learning
Zhu, Qi, Zhou, Yuze, Fei, Lunke, Zhang, Daoqiang, Zhang, David
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
Loading…
An Adversarial Example Generation Method Based on Mask Extraction
Li, Mingzhe, Liu, Jieyi, Lin, Zixuan, Yang, Yaoming, Zou, Yutong, Zhou, Yu
Published in 2024 8th Asian Conference on Artificial Intelligence Technology (ACAIT) (08.11.2024)
Published in 2024 8th Asian Conference on Artificial Intelligence Technology (ACAIT) (08.11.2024)
Get full text
Conference Proceeding
Loading…
Loading…
ApaNet: adversarial perturbations alleviation network for face verification
Sun, Guangling, Hu, Haoqi, Su, Yuying, Liu, Qi, Lu, Xiaofeng
Published in Multimedia tools and applications (01.02.2023)
Published in Multimedia tools and applications (01.02.2023)
Get full text
Journal Article
Loading…
AaceGEN: Attention Guided Adversarial Code Example Generation for Deep Code Models
Li, Zhong, Zhang, Chong, Pan, Minxue, Zhang, Tian, Li, Xuandong
Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)
Published in IEEE/ACM International Conference on Automated Software Engineering : [proceedings] (27.10.2024)
Get full text
Conference Proceeding
Loading…
Non-Singular Adversarial Robustness of Neural Networks
Tsai, Yu-Lin, Hsu, Chia-Yi, Yu, Chia-Mu, Chen, Pin-Yu
Published in Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) (06.06.2021)
Published in Proceedings of the ... IEEE International Conference on Acoustics, Speech and Signal Processing (1998) (06.06.2021)
Get full text
Conference Proceeding
Loading…
Enhancing the Robustness of Deep Neural Networks from "Smart" Compression
Tao Liu, Zihao Liu, Qi Liu, Wujie Wen
Published in 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (01.07.2018)
Published in 2018 IEEE Computer Society Annual Symposium on VLSI (ISVLSI) (01.07.2018)
Get full text
Conference Proceeding
Loading…
Improvement of Detection Accuracy for Calcification Regions in Dental Panoramic Radiographs Using LVAT
Ikeda, Naoki, Takano, Sei, Muneyasu, Mitsuji, Yoshida, Soh, Asano, Akira, Dewake, Nanae, Yoshinari, Nobuo, Uchida, Keiichi
Published in Annual Conference for Protective Relay Engineers : [proceedings] (10.12.2024)
Published in Annual Conference for Protective Relay Engineers : [proceedings] (10.12.2024)
Get full text
Conference Proceeding
Loading…
Adversarial Text-Based CAPTCHA Generation Method Utilizing Spatial Smoothing
Matsuura, Yuichiro, Kato, Hiroya, Sasase, Iwao
Published in 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)
Published in 2021 IEEE Global Communications Conference (GLOBECOM) (01.12.2021)
Get full text
Conference Proceeding
Loading…
Loading…
Loading…
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
Chen, Jiming, Gao, Xiangshan, Deng, Ruilong, He, Yang, Fang, Chongrong, Cheng, Peng
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples
Yuan, Zihan, Zhang, Xinpeng, Wang, Zichi, Yin, Zhaoxia
Published in IEEE transactions on emerging topics in computational intelligence (01.08.2024)
Published in IEEE transactions on emerging topics in computational intelligence (01.08.2024)
Get full text
Journal Article
Loading…
Loading…
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Demetrio, Luca, Coull, Scott E., Biggio, Battista, Lagorio, Giovanni, Armando, Alessandro, Roli, Fabio
Published in ACM transactions on privacy and security (01.11.2021)
Published in ACM transactions on privacy and security (01.11.2021)
Get full text
Journal Article
Loading…