These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
131 related articles for article (PubMed ID: 32872801)
21. Reshuffling scale-free networks: from random to assortative. Xulvi-Brunet R; Sokolov IM Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Dec; 70(6 Pt 2):066102. PubMed ID: 15697429 [TBL] [Abstract][Full Text] [Related]
22. Robustness of network of networks under targeted attack. Dong G; Gao J; Du R; Tian L; Stanley HE; Havlin S Phys Rev E Stat Nonlin Soft Matter Phys; 2013 May; 87(5):052804. PubMed ID: 23767581 [TBL] [Abstract][Full Text] [Related]
23. Improving robustness in interdependent networks under intentional attacks by optimizing intra-link allocation. Hao Y; Jia L; Wang Y; He Z Chaos; 2021 Sep; 31(9):093133. PubMed ID: 34598464 [TBL] [Abstract][Full Text] [Related]
24. Maximal planar networks with large clustering coefficient and power-law degree distribution. Zhou T; Yan G; Wang BH Phys Rev E Stat Nonlin Soft Matter Phys; 2005 Apr; 71(4 Pt 2):046141. PubMed ID: 15903760 [TBL] [Abstract][Full Text] [Related]
25. Geometry-Aware Generation of Adversarial Point Clouds. Wen Y; Lin J; Chen K; Chen CLP; Jia K IEEE Trans Pattern Anal Mach Intell; 2022 Jun; 44(6):2984-2999. PubMed ID: 33320808 [TBL] [Abstract][Full Text] [Related]
26. Rewiring dynamical networks with prescribed degree distribution for enhancing synchronizability. Dadashi M; Barjasteh I; Jalili M Chaos; 2010 Dec; 20(4):043119. PubMed ID: 21198089 [TBL] [Abstract][Full Text] [Related]
27. Average path length in random networks. Fronczak A; Fronczak P; Hołyst JA Phys Rev E Stat Nonlin Soft Matter Phys; 2004 Nov; 70(5 Pt 2):056110. PubMed ID: 15600695 [TBL] [Abstract][Full Text] [Related]
28. Effects of random rewiring on the degree correlation of scale-free networks. Qu J; Wang SJ; Jusup M; Wang Z Sci Rep; 2015 Oct; 5():15450. PubMed ID: 26482005 [TBL] [Abstract][Full Text] [Related]
29. Adversarial concept drift detection under poisoning attacks for robust data stream mining. Korycki Ł; Krawczyk B Mach Learn; 2022 Jun; ():1-36. PubMed ID: 35668720 [TBL] [Abstract][Full Text] [Related]
30. Predicting facility-based delivery in Zanzibar: The vulnerability of machine learning algorithms to adversarial attacks. Tsai YT; Fulcher IR; Li T; Sukums F; Hedt-Gauthier B Heliyon; 2023 May; 9(5):e16244. PubMed ID: 37234636 [TBL] [Abstract][Full Text] [Related]
31. Adversarial Metric Attack and Defense for Person Re-Identification. Bai S; Li Y; Zhou Y; Li Q; Torr PHS IEEE Trans Pattern Anal Mach Intell; 2021 Jun; 43(6):2119-2126. PubMed ID: 33064650 [TBL] [Abstract][Full Text] [Related]
32. Adding links on minimum degree and longest distance strategies for improving network robustness and efficiency. Chujyo M; Hayashi Y PLoS One; 2022; 17(10):e0276733. PubMed ID: 36288333 [TBL] [Abstract][Full Text] [Related]
33. Statistical analysis of edges and bredges in configuration model networks. Bonneau H; Biham O; Kühn R; Katzav E Phys Rev E; 2020 Jul; 102(1-1):012314. PubMed ID: 32794990 [TBL] [Abstract][Full Text] [Related]
34. Randomized Prediction Games for Adversarial Machine Learning. Rota Bulo S; Biggio B; Pillai I; Pelillo M; Roli F IEEE Trans Neural Netw Learn Syst; 2017 Nov; 28(11):2466-2478. PubMed ID: 27514067 [TBL] [Abstract][Full Text] [Related]
35. Adversarial Attacks on Time Series. Karim F; Majumdar S; Darabi H IEEE Trans Pattern Anal Mach Intell; 2021 Oct; 43(10):3309-3320. PubMed ID: 32286957 [TBL] [Abstract][Full Text] [Related]
36. On the robustness of skeleton detection against adversarial attacks. Bai X; Yang M; Liu Z Neural Netw; 2020 Dec; 132():416-427. PubMed ID: 33022470 [TBL] [Abstract][Full Text] [Related]
37. Hierarchical gated recurrent neural network with adversarial and virtual adversarial training on text classification. Poon HK; Yap WS; Tee YK; Lee WK; Goi BM Neural Netw; 2019 Nov; 119():299-312. PubMed ID: 31499354 [TBL] [Abstract][Full Text] [Related]
38. Dictionary Learning Based Scheme for Adversarial Defense in Continuous-Variable Quantum Key Distribution. Li S; Yin P; Zhou Z; Tang J; Huang D; Zhang L Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981387 [TBL] [Abstract][Full Text] [Related]
39. Degree-based attacks and defense strategies in complex networks. Yehezkel A; Cohen R Phys Rev E Stat Nonlin Soft Matter Phys; 2012 Dec; 86(6 Pt 2):066114. PubMed ID: 23368011 [TBL] [Abstract][Full Text] [Related]
40. Robust-yet-fragile nature of interdependent networks. Tan F; Xia Y; Wei Z Phys Rev E Stat Nonlin Soft Matter Phys; 2015 May; 91(5):052809. PubMed ID: 26066214 [TBL] [Abstract][Full Text] [Related] [Previous] [Next] [New Search]