These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

112 related articles for article (PubMed ID: 36433292)

  • 1. IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions.
    Xu Y; Liu X; Ding K; Xin B
    Sensors (Basel); 2022 Nov; 22(22):. PubMed ID: 36433292
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Detection of Backdoors in Trained Classifiers Without Access to the Training Set.
    Xiang Z; Miller DJ; Kesidis G
    IEEE Trans Neural Netw Learn Syst; 2022 Mar; 33(3):1177-1191. PubMed ID: 33326384
    [TBL] [Abstract][Full Text] [Related]  

  • 3. A Textual Backdoor Defense Method Based on Deep Feature Classification.
    Shao K; Yang J; Hu P; Li X
    Entropy (Basel); 2023 Jan; 25(2):. PubMed ID: 36832587
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Poison Ink: Robust and Invisible Backdoor Attack.
    Zhang J; Dongdong C; Huang Q; Liao J; Zhang W; Feng H; Hua G; Yu N
    IEEE Trans Image Process; 2022; 31():5691-5705. PubMed ID: 36040942
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Trap and Replace: Defending Backdoor Attacks by Trapping Them into an Easy-to-Replace Subnetwork.
    Wang H; Hong J; Zhang A; Zhou J; Wang Z
    Adv Neural Inf Process Syst; 2022 Dec; 35():36026-36039. PubMed ID: 37081923
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Unambiguous and High-Fidelity Backdoor Watermarking for Deep Neural Networks.
    Hua G; Teoh ABJ; Xiang Y; Jiang H
    IEEE Trans Neural Netw Learn Syst; 2024 Aug; 35(8):11204-11217. PubMed ID: 37028031
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Exploiting Missing Value Patterns for a Backdoor Attack on Machine Learning Models of Electronic Health Records: Development and Validation Study.
    Joe B; Park Y; Hamm J; Shin I; Lee J
    JMIR Med Inform; 2022 Aug; 10(8):e38440. PubMed ID: 35984701
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Backdoor Learning: A Survey.
    Li Y; Jiang Y; Li Z; Xia ST
    IEEE Trans Neural Netw Learn Syst; 2024 Jan; 35(1):5-22. PubMed ID: 35731760
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Edge-Cloud Collaborative Defense against Backdoor Attacks in Federated Learning.
    Yang J; Zheng J; Wang H; Li J; Sun H; Han W; Jiang N; Tan YA
    Sensors (Basel); 2023 Jan; 23(3):. PubMed ID: 36772101
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Critical Path-Based Backdoor Detection for Deep Neural Networks.
    Jiang W; Wen X; Zhan J; Wang X; Song Z; Bian C
    IEEE Trans Neural Netw Learn Syst; 2024 Mar; 35(3):4032-4046. PubMed ID: 36074883
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Backdoor attacks against distributed swarm learning.
    Chen K; Zhang H; Feng X; Zhang X; Mi B; Jin Z
    ISA Trans; 2023 Oct; 141():59-72. PubMed ID: 37012167
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Detecting Scene-Plausible Perceptible Backdoors in Trained DNNs Without Access to the Training Set.
    Xiang Z; Miller DJ; Wang H; Kesidis G
    Neural Comput; 2021 Apr; 33(5):1329-1371. PubMed ID: 33617746
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Deep in the Bowel: Highly Interpretable Neural Encoder-Decoder Networks Predict Gut Metabolites from Gut Microbiome.
    Le V; Quinn TP; Tran T; Venkatesh S
    BMC Genomics; 2020 Jul; 21(Suppl 4):256. PubMed ID: 32689932
    [TBL] [Abstract][Full Text] [Related]  

  • 14. EEG-Based Brain-Computer Interfaces are Vulnerable to Backdoor Attacks.
    Meng L; Jiang X; Huang J; Zeng Z; Yu S; Jung TP; Lin CT; Chavarriaga R; Wu D
    IEEE Trans Neural Syst Rehabil Eng; 2023; 31():2224-2234. PubMed ID: 37145943
    [TBL] [Abstract][Full Text] [Related]  

  • 15. GLD-Net: Deep Learning to Detect DDoS Attack via Topological and Traffic Feature Fusion.
    Guo W; Qiu H; Liu Z; Zhu J; Wang Q
    Comput Intell Neurosci; 2022; 2022():4611331. PubMed ID: 36017461
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Fusion Methods for Face Presentation Attack Detection.
    Abdullakutty F; Johnston P; Elyan E
    Sensors (Basel); 2022 Jul; 22(14):. PubMed ID: 35890876
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An Adaptive Black-Box Defense Against Trojan Attacks (TrojDef).
    Liu G; Khreishah A; Sharadgah F; Khalil I
    IEEE Trans Neural Netw Learn Syst; 2024 Apr; 35(4):5367-5381. PubMed ID: 37015563
    [TBL] [Abstract][Full Text] [Related]  

  • 18. When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time.
    Miller D; Wang Y; Kesidis G
    Neural Comput; 2019 Aug; 31(8):1624-1670. PubMed ID: 31260390
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
    Li X; Goodman D; Liu J; Wei T; Dou D
    Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Uni-image: Universal image construction for robust neural model.
    Ho J; Lee BG; Kang DK
    Neural Netw; 2020 Aug; 128():279-287. PubMed ID: 32454372
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.