These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
4. An ensemble learning method with GAN-based sampling and consistency check for anomaly detection of imbalanced data streams with concept drift. Liu Y; Wang S; Sui H; Zhu L PLoS One; 2024; 19(1):e0292140. PubMed ID: 38277426 [TBL] [Abstract][Full Text] [Related]
5. A survey on detecting healthcare concept drift in AI/ML models from a finance perspective. M S AR; C R N; B R S; Lahza H; Lahza HFM Front Artif Intell; 2022; 5():955314. PubMed ID: 37139355 [TBL] [Abstract][Full Text] [Related]
6. Driftage: a multi-agent system framework for concept drift detection. Vieira DM; Fernandes C; Lucena C; Lifschitz S Gigascience; 2021 Jun; 10(6):. PubMed ID: 34061207 [TBL] [Abstract][Full Text] [Related]
9. Design of adaptive ensemble classifier for online sentiment analysis and opinion mining. Kumar S; Singh R; Khan MZ; Noorwali A PeerJ Comput Sci; 2021; 7():e660. PubMed ID: 34435102 [TBL] [Abstract][Full Text] [Related]
10. Divergence-Agnostic Unsupervised Domain Adaptation by Adversarial Attacks. Li J; Du Z; Zhu L; Ding Z; Lu K; Shen HT IEEE Trans Pattern Anal Mach Intell; 2022 Nov; 44(11):8196-8211. PubMed ID: 34478362 [TBL] [Abstract][Full Text] [Related]
11. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT. Li S; Wang J; Wang Y; Zhou G; Zhao Y Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700 [TBL] [Abstract][Full Text] [Related]
12. Personalized insulin dose manipulation attack and its detection using interval-based temporal patterns and machine learning algorithms. Levy-Loboda T; Sheetrit E; Liberty IF; Haim A; Nissim N J Biomed Inform; 2022 Aug; 132():104129. PubMed ID: 35781036 [TBL] [Abstract][Full Text] [Related]
13. Adaptive Chunk-Based Dynamic Weighted Majority for Imbalanced Data Streams With Concept Drift. Lu Y; Cheung YM; Yan Tang Y IEEE Trans Neural Netw Learn Syst; 2020 Aug; 31(8):2764-2778. PubMed ID: 31825880 [TBL] [Abstract][Full Text] [Related]
14. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS). Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626 [TBL] [Abstract][Full Text] [Related]
15. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems. Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ Front Big Data; 2022; 5():822783. PubMed ID: 35592793 [TBL] [Abstract][Full Text] [Related]
16. Adversarial robustness assessment: Why in evaluation both L0 and L∞ attacks are necessary. Kotyan S; Vargas DV PLoS One; 2022; 17(4):e0265723. PubMed ID: 35421125 [TBL] [Abstract][Full Text] [Related]
17. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems. Tian J; Wang B; Wang Z; Cao K; Li J; Ozay M IEEE Trans Cybern; 2022 Dec; 52(12):13699-13713. PubMed ID: 34797772 [TBL] [Abstract][Full Text] [Related]
18. DReLAB - Deep REinforcement Learning Adversarial Botnet: A benchmark dataset for adversarial attacks against botnet Intrusion Detection Systems. Venturi A; Apruzzese G; Andreolini M; Colajanni M; Marchetti M Data Brief; 2021 Feb; 34():106631. PubMed ID: 33365367 [TBL] [Abstract][Full Text] [Related]