BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

207 related articles for article (PubMed ID: 34797772)

  • 1. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems.
    Tian J; Wang B; Wang Z; Cao K; Li J; Ozay M
    IEEE Trans Cybern; 2022 Dec; 52(12):13699-13713. PubMed ID: 34797772
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks.
    Hwang RH; Lin JY; Hsieh SY; Lin HY; Lin CL
    Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679651
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems.
    Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ
    Front Big Data; 2022; 5():822783. PubMed ID: 35592793
    [TBL] [Abstract][Full Text] [Related]  

  • 4. A Feature Space-Restricted Attention Attack on Medical Deep Learning Systems.
    Wang Z; Shu X; Wang Y; Feng Y; Zhang L; Yi Z
    IEEE Trans Cybern; 2023 Aug; 53(8):5323-5335. PubMed ID: 36240037
    [TBL] [Abstract][Full Text] [Related]  

  • 5. DEFEAT: Decoupled feature attack across deep neural networks.
    Huang L; Gao C; Liu N
    Neural Netw; 2022 Dec; 156():13-28. PubMed ID: 36228335
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Local imperceptible adversarial attacks against human pose estimation networks.
    Liu F; Zhang S; Wang H; Yan C; Miao Y
    Vis Comput Ind Biomed Art; 2023 Nov; 6(1):22. PubMed ID: 37985638
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors.
    Bortsova G; González-Gonzalo C; Wetstein SC; Dubost F; Katramados I; Hogeweg L; Liefers B; van Ginneken B; Pluim JPW; Veta M; Sánchez CI; de Bruijne M
    Med Image Anal; 2021 Oct; 73():102141. PubMed ID: 34246850
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.
    Mu R; Marcolino L; Ni Q; Ruan W
    Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756
    [TBL] [Abstract][Full Text] [Related]  

  • 9. New Adversarial Image Detection Based on Sentiment Analysis.
    Wang Y; Li T; Li S; Yuan X; Ni W
    IEEE Trans Neural Netw Learn Syst; 2023 May; PP():. PubMed ID: 37204956
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Perturbation diversity certificates robust generalization.
    Qian Z; Zhang S; Huang K; Wang Q; Yi X; Gu B; Xiong H
    Neural Netw; 2024 Apr; 172():106117. PubMed ID: 38232423
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Towards evaluating the robustness of deep diagnostic models by adversarial attack.
    Xu M; Zhang T; Li Z; Liu M; Zhang D
    Med Image Anal; 2021 Apr; 69():101977. PubMed ID: 33550005
    [TBL] [Abstract][Full Text] [Related]  

  • 12. A Universal Detection Method for Adversarial Examples and Fake Images.
    Lai J; Huo Y; Hou R; Wang X
    Sensors (Basel); 2022 Apr; 22(9):. PubMed ID: 35591134
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Boosting the transferability of adversarial examples via stochastic serial attack.
    Hao L; Hao K; Wei B; Tang XS
    Neural Netw; 2022 Jun; 150():58-67. PubMed ID: 35305532
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Adversarial attacks against supervised machine learning based network intrusion detection systems.
    Alshahrani E; Alghazzawi D; Alotaibi R; Rabie O
    PLoS One; 2022; 17(10):e0275971. PubMed ID: 36240162
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Event-Based Optimal Stealthy False Data-Injection Attacks Against Remote State Estimation Systems.
    Guo H; Sun J; Pang ZH; Liu GP
    IEEE Trans Cybern; 2023 Oct; 53(10):6714-6724. PubMed ID: 37030790
    [TBL] [Abstract][Full Text] [Related]  

  • 16. An adversarial example attack method based on predicted bounding box adaptive deformation in optical remote sensing images.
    Dai L; Wang J; Yang B; Chen F; Zhang H
    PeerJ Comput Sci; 2024; 10():e2053. PubMed ID: 38855243
    [TBL] [Abstract][Full Text] [Related]  

  • 17. The data dimensionality reduction and bad data detection in the process of smart grid reconstruction through machine learning.
    Yu B; Wang Z; Liu S; Liu X; Gou R
    PLoS One; 2020; 15(10):e0237994. PubMed ID: 33027298
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model.
    Zhang D; Dong Y
    Neural Netw; 2023 Oct; 167():730-740. PubMed ID: 37729788
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Remix: Towards the transferability of adversarial examples.
    Zhao H; Hao L; Hao K; Wei B; Cai X
    Neural Netw; 2023 Jun; 163():367-378. PubMed ID: 37119676
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Frequency constraint-based adversarial attack on deep neural networks for medical image classification.
    Chen F; Wang J; Liu H; Kong W; Zhao Z; Ma L; Liao H; Zhang D
    Comput Biol Med; 2023 Sep; 164():107248. PubMed ID: 37515875
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 11.