Loading…
Loading…
Generating Adversarial Examples Against Machine Learning-Based Intrusion Detector in Industrial Control Systems
Chen, Jiming, Gao, Xiangshan, Deng, Ruilong, He, Yang, Fang, Chongrong, Cheng, Peng
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Published in IEEE transactions on dependable and secure computing (01.05.2022)
Get full text
Journal Article
Loading…
Loading…
Loading…
Multi-Spectral Palmprints joint Attack and Defense with Adversarial Examples Learning
Zhu, Qi, Zhou, Yuze, Fei, Lunke, Zhang, Daoqiang, Zhang, David
Published in IEEE transactions on information forensics and security (01.01.2023)
Published in IEEE transactions on information forensics and security (01.01.2023)
Get full text
Journal Article
Loading…
Semi-Fragile Neural Network Watermarking Based on Adversarial Examples
Yuan, Zihan, Zhang, Xinpeng, Wang, Zichi, Yin, Zhaoxia
Published in IEEE transactions on emerging topics in computational intelligence (01.08.2024)
Published in IEEE transactions on emerging topics in computational intelligence (01.08.2024)
Get full text
Journal Article
Loading…
Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Malware Detection
Demetrio, Luca, Coull, Scott E., Biggio, Battista, Lagorio, Giovanni, Armando, Alessandro, Roli, Fabio
Published in ACM transactions on privacy and security (01.11.2021)
Published in ACM transactions on privacy and security (01.11.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
Model Compression Hardens Deep Neural Networks: A New Perspective to Prevent Adversarial Attacks
Liu, Qi, Wen, Wujie
Published in IEEE transaction on neural networks and learning systems (01.01.2023)
Published in IEEE transaction on neural networks and learning systems (01.01.2023)
Get full text
Journal Article
Loading…
Loading…
Loading…
Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning
Gudaparthi, Hemanth, Niu, Nan, Wang, Boyang, Bhowmik, Tanmay, Liu, Hui, Zhang, Jianzhang, Savolainen, Juha, Horton, Glen, Crowe, Sean, Scherz, Thomas, Haitz, Lisa
Published in Proceedings of the IEEE International Symposium on Requirements Engineering (01.09.2023)
Published in Proceedings of the IEEE International Symposium on Requirements Engineering (01.09.2023)
Get full text
Conference Proceeding
Loading…
Adversarial robustness via noise injection in smoothed models
Nemcovsky, Yaniv, Zheltonozhskii, Evgenii, Baskin, Chaim, Chmiel, Brian, Bronstein, Alex M., Mendelson, Avi
Published in Applied intelligence (Dordrecht, Netherlands) (01.04.2023)
Published in Applied intelligence (Dordrecht, Netherlands) (01.04.2023)
Get full text
Journal Article
Loading…
Scaling Camouflage: Content Disguising Attack Against Computer Vision Applications
Chen, Yufei, Shen, Chao, Wang, Cong, Xiao, Qixue, Li, Kang, Chen, Yu
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Published in IEEE transactions on dependable and secure computing (01.09.2021)
Get full text
Journal Article
Loading…
Loading…
Loading…
New Horizons in Web Search, Web Data Mining, and Web-Based Applications
Year of Publication 2024
Get full text
eBook
Loading…
Loading…