BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

152 related articles for article (PubMed ID: 37441909)

  • 1. Strengthening transferability of adversarial examples by adaptive inertia and amplitude spectrum dropout.
    Li H; Yu W; Huang H
    Neural Netw; 2023 Aug; 165():925-937. PubMed ID: 37441909
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing.
    Xie P; Shi S; Yang S; Qiao K; Liang N; Wang L; Chen J; Hu G; Yan B
    Front Neurorobot; 2021; 15():784053. PubMed ID: 34955802
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Boosting the transferability of adversarial examples via stochastic serial attack.
    Hao L; Hao K; Wei B; Tang XS
    Neural Netw; 2022 Jun; 150():58-67. PubMed ID: 35305532
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Enhancing adversarial attacks with resize-invariant and logical ensemble.
    Shao Y; Zhang Y; Dong W; Zhang Q; Shan P; Guo J; Xu H
    Neural Netw; 2024 May; 173():106194. PubMed ID: 38402809
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Gradient Correction for White-Box Adversarial Attacks.
    Liu H; Ge Z; Zhou Z; Shang F; Liu Y; Jiao L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; PP():. PubMed ID: 37819820
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Robustifying Deep Networks for Medical Image Segmentation.
    Liu Z; Zhang J; Jog V; Loh PL; McMillan AB
    J Digit Imaging; 2021 Oct; 34(5):1279-1293. PubMed ID: 34545476
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.
    Luo P; Wang B; Tian J; Liu C; Yang Y
    Sensors (Basel); 2024 Jun; 24(11):. PubMed ID: 38894375
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Remix: Towards the transferability of adversarial examples.
    Zhao H; Hao L; Hao K; Wei B; Cai X
    Neural Netw; 2023 Jun; 163():367-378. PubMed ID: 37119676
    [TBL] [Abstract][Full Text] [Related]  

  • 9. DEFEAT: Decoupled feature attack across deep neural networks.
    Huang L; Gao C; Liu N
    Neural Netw; 2022 Dec; 156():13-28. PubMed ID: 36228335
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors.
    Bortsova G; González-Gonzalo C; Wetstein SC; Dubost F; Katramados I; Hogeweg L; Liefers B; van Ginneken B; Pluim JPW; Veta M; Sánchez CI; de Bruijne M
    Med Image Anal; 2021 Oct; 73():102141. PubMed ID: 34246850
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Adaptive Perturbation for Adversarial Attack.
    Yuan Z; Zhang J; Jiang Z; Li L; Shan S
    IEEE Trans Pattern Anal Mach Intell; 2024 Feb; PP():. PubMed ID: 38376968
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Toward Understanding and Boosting Adversarial Transferability From a Distribution Perspective.
    Zhu Y; Chen Y; Li X; Chen K; He Y; Tian X; Zheng B; Chen Y; Huang Q
    IEEE Trans Image Process; 2022; 31():6487-6501. PubMed ID: 36223353
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Erosion Attack: Harnessing Corruption To Improve Adversarial Examples.
    Huang L; Gao C; Liu N
    IEEE Trans Image Process; 2023; 32():4828-4841. PubMed ID: 37058378
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Towards Transferable Adversarial Attacks on Image and Video Transformers.
    Wei Z; Chen J; Goldblum M; Wu Z; Goldstein T; Jiang YG; Davis LS
    IEEE Trans Image Process; 2023; 32():6346-6358. PubMed ID: 37966925
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Image classification adversarial attack with improved resizing transformation and ensemble models.
    Li C; Zhang H; Yang B; Wang J
    PeerJ Comput Sci; 2023; 9():e1475. PubMed ID: 37547405
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Adaptive Cross-Modal Transferable Adversarial Attacks From Images to Videos.
    Wei Z; Chen J; Wu Z; Jiang YG
    IEEE Trans Pattern Anal Mach Intell; 2024 May; 46(5):3772-3783. PubMed ID: 38153825
    [TBL] [Abstract][Full Text] [Related]  

  • 17. An adversarial example attack method based on predicted bounding box adaptive deformation in optical remote sensing images.
    Dai L; Wang J; Yang B; Chen F; Zhang H
    PeerJ Comput Sci; 2024; 10():e2053. PubMed ID: 38855243
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Learning defense transformations for counterattacking adversarial examples.
    Li J; Zhang S; Cao J; Tan M
    Neural Netw; 2023 Jul; 164():177-185. PubMed ID: 37149918
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model.
    Zhang D; Dong Y
    Neural Netw; 2023 Oct; 167():730-740. PubMed ID: 37729788
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet.
    Chen S; He Z; Sun C; Yang J; Huang X
    IEEE Trans Pattern Anal Mach Intell; 2022 Apr; 44(4):2188-2197. PubMed ID: 33095710
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 8.