These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

135 related articles for article (PubMed ID: 34752388)

  • 1. Query-Efficient Black-Box Adversarial Attacks Guided by a Transfer-Based Prior.
    Dong Y; Cheng S; Pang T; Su H; Zhu J
    IEEE Trans Pattern Anal Mach Intell; 2022 Dec; 44(12):9536-9548. PubMed ID: 34752388
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Query-Efficient Black-Box Adversarial Attack With Customized Iteration and Sampling.
    Shi Y; Han Y; Hu Q; Yang Y; Tian Q
    IEEE Trans Pattern Anal Mach Intell; 2023 Feb; 45(2):2226-2245. PubMed ID: 35468057
    [TBL] [Abstract][Full Text] [Related]  

  • 3. SMGEA: A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories.
    Che Z; Borji A; Zhai G; Ling S; Li J; Min X; Guo G; Le Callet P
    IEEE Trans Neural Netw Learn Syst; 2022 Mar; 33(3):1051-1065. PubMed ID: 33296311
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Generalizable Black-Box Adversarial Attack With Meta Learning.
    Yin F; Zhang Y; Wu B; Feng Y; Zhang J; Fan Y; Yang Y
    IEEE Trans Pattern Anal Mach Intell; 2024 Mar; 46(3):1804-1818. PubMed ID: 37021863
    [TBL] [Abstract][Full Text] [Related]  

  • 5. A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization.
    Suryanto N; Kang H; Kim Y; Yun Y; Larasati HT; Kim H
    Sensors (Basel); 2020 Dec; 20(24):. PubMed ID: 33327453
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Optimizing Latent Variables in Integrating Transfer and Query Based Attack Framework.
    Li C; Jiang T; Wang H; Yao W; Wang D
    IEEE Trans Pattern Anal Mach Intell; 2024 Sep; PP():. PubMed ID: 39283790
    [TBL] [Abstract][Full Text] [Related]  

  • 7. An Optimized Black-Box Adversarial Simulator Attack Based on Meta-Learning.
    Chen Z; Ding J; Wu F; Zhang C; Sun Y; Sun J; Liu S; Ji Y
    Entropy (Basel); 2022 Sep; 24(10):. PubMed ID: 37420397
    [TBL] [Abstract][Full Text] [Related]  

  • 8. ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers.
    Cao H; Si C; Sun Q; Liu Y; Li S; Gope P
    Entropy (Basel); 2022 Mar; 24(3):. PubMed ID: 35327923
    [TBL] [Abstract][Full Text] [Related]  

  • 9. HyGloadAttack: Hard-label black-box textual adversarial attacks via hybrid optimization.
    Liu Z; Xiong X; Li Y; Yu Y; Lu J; Zhang S; Xiong F
    Neural Netw; 2024 Oct; 178():106461. PubMed ID: 38906054
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Adversarial Attack Against Deep Saliency Models Powered by Non-Redundant Priors.
    Che Z; Borji A; Zhai G; Ling S; Li J; Tian Y; Guo G; Le Callet P
    IEEE Trans Image Process; 2021; 30():1973-1988. PubMed ID: 33444138
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Simultaneously Optimizing Perturbations and Positions for Black-Box Adversarial Patch Attacks.
    Wei X; Guo Y; Yu J; Zhang B
    IEEE Trans Pattern Anal Mach Intell; 2023 Jul; 45(7):9041-9054. PubMed ID: 37015667
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors.
    Bortsova G; González-Gonzalo C; Wetstein SC; Dubost F; Katramados I; Hogeweg L; Liefers B; van Ginneken B; Pluim JPW; Veta M; Sánchez CI; de Bruijne M
    Med Image Anal; 2021 Oct; 73():102141. PubMed ID: 34246850
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Remix: Towards the transferability of adversarial examples.
    Zhao H; Hao L; Hao K; Wei B; Cai X
    Neural Netw; 2023 Jun; 163():367-378. PubMed ID: 37119676
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Adversarial Examples for Hamming Space Search.
    Yang E; Liu T; Deng C; Tao D
    IEEE Trans Cybern; 2020 Apr; 50(4):1473-1484. PubMed ID: 30561358
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Model Compression Hardens Deep Neural Networks: A New Perspective to Prevent Adversarial Attacks.
    Liu Q; Wen W
    IEEE Trans Neural Netw Learn Syst; 2023 Jan; 34(1):3-14. PubMed ID: 34181553
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Toward Visual Distortion in Black-Box Attacks.
    Li N; Chen Z
    IEEE Trans Image Process; 2021; 30():6156-6167. PubMed ID: 34214038
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Generating adversarial examples without specifying a target model.
    Yang G; Li M; Fang X; Zhang J; Liang X
    PeerJ Comput Sci; 2021; 7():e702. PubMed ID: 34616888
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Gradient Correction for White-Box Adversarial Attacks.
    Liu H; Ge Z; Zhou Z; Shang F; Liu Y; Jiao L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; PP():. PubMed ID: 37819820
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval.
    Chen B; Feng Y; Dai T; Bai J; Jiang Y; Xia ST; Wang X
    IEEE Trans Pattern Anal Mach Intell; 2023 Feb; 45(2):1388-1404. PubMed ID: 35380957
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing.
    Xie P; Shi S; Yang S; Qiao K; Liang N; Wang L; Chen J; Hu G; Yan B
    Front Neurorobot; 2021; 15():784053. PubMed ID: 34955802
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.