198 related articles for article (PubMed ID: 37679102)
1. Attention distraction with gradient sharpening for multi-task adversarial attack.
Liu B; Hu J; Deng W
Math Biosci Eng; 2023 Jun; 20(8):13562-13580. PubMed ID: 37679102
[TBL] [Abstract][Full Text] [Related]
2. DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.
Liu R; Jin X; Hu D; Zhang J; Wang Y; Zhang J; Zhou W
Front Neurorobot; 2023; 17():1129720. PubMed ID: 36845066
[TBL] [Abstract][Full Text] [Related]
3. Adversarial Examples: Attacks and Defenses for Deep Learning.
Yuan X; He P; Zhu Q; Li X
IEEE Trans Neural Netw Learn Syst; 2019 Sep; 30(9):2805-2824. PubMed ID: 30640631
[TBL] [Abstract][Full Text] [Related]
4. PSAT-GAN: Efficient Adversarial Attacks Against Holistic Scene Understanding.
Wang L; Yoon KJ
IEEE Trans Image Process; 2021; 30():7541-7553. PubMed ID: 34449361
[TBL] [Abstract][Full Text] [Related]
5. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems.
Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ
Front Big Data; 2022; 5():822783. PubMed ID: 35592793
[TBL] [Abstract][Full Text] [Related]
6. Adversarial Examples Generation for Deep Product Quantization Networks on Image Retrieval.
Chen B; Feng Y; Dai T; Bai J; Jiang Y; Xia ST; Wang X
IEEE Trans Pattern Anal Mach Intell; 2023 Feb; 45(2):1388-1404. PubMed ID: 35380957
[TBL] [Abstract][Full Text] [Related]
7. ApaNet: adversarial perturbations alleviation network for face verification.
Sun G; Hu H; Su Y; Liu Q; Lu X
Multimed Tools Appl; 2023; 82(5):7443-7461. PubMed ID: 36035322
[TBL] [Abstract][Full Text] [Related]
8. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
Li X; Goodman D; Liu J; Wei T; Dou D
Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010
[TBL] [Abstract][Full Text] [Related]
9. Enhancing adversarial defense for medical image analysis systems with pruning and attention mechanism.
Chen L; Zhao L; Chen CY
Med Phys; 2021 Oct; 48(10):6198-6212. PubMed ID: 34487364
[TBL] [Abstract][Full Text] [Related]
10. Boosting the transferability of adversarial examples via stochastic serial attack.
Hao L; Hao K; Wei B; Tang XS
Neural Netw; 2022 Jun; 150():58-67. PubMed ID: 35305532
[TBL] [Abstract][Full Text] [Related]
11. Remix: Towards the transferability of adversarial examples.
Zhao H; Hao L; Hao K; Wei B; Cai X
Neural Netw; 2023 Jun; 163():367-378. PubMed ID: 37119676
[TBL] [Abstract][Full Text] [Related]
12. Towards evaluating the robustness of deep diagnostic models by adversarial attack.
Xu M; Zhang T; Li Z; Liu M; Zhang D
Med Image Anal; 2021 Apr; 69():101977. PubMed ID: 33550005
[TBL] [Abstract][Full Text] [Related]
13. Analyzing the Noise Robustness of Deep Neural Networks.
Cao K; Liu M; Su H; Wu J; Zhu J; Liu S
IEEE Trans Vis Comput Graph; 2021 Jul; 27(7):3289-3304. PubMed ID: 31985427
[TBL] [Abstract][Full Text] [Related]
14. A Feature Space-Restricted Attention Attack on Medical Deep Learning Systems.
Wang Z; Shu X; Wang Y; Feng Y; Zhang L; Yi Z
IEEE Trans Cybern; 2023 Aug; 53(8):5323-5335. PubMed ID: 36240037
[TBL] [Abstract][Full Text] [Related]
15. Gradient Correction for White-Box Adversarial Attacks.
Liu H; Ge Z; Zhou Z; Shang F; Liu Y; Jiao L
IEEE Trans Neural Netw Learn Syst; 2023 Oct; PP():. PubMed ID: 37819820
[TBL] [Abstract][Full Text] [Related]
16. A Hamiltonian Monte Carlo Method for Probabilistic Adversarial Attack and Learning.
Wang H; Li G; Liu X; Lin L
IEEE Trans Pattern Anal Mach Intell; 2022 Apr; 44(4):1725-1737. PubMed ID: 33074803
[TBL] [Abstract][Full Text] [Related]
17. Mimic and Fool: A Task-Agnostic Adversarial Attack.
Chaturvedi A; Garain U
IEEE Trans Neural Netw Learn Syst; 2021 Apr; 32(4):1801-1808. PubMed ID: 32310805
[TBL] [Abstract][Full Text] [Related]
18. Universal Adversarial Patch Attack for Automatic Checkout Using Perceptual and Attentional Bias.
Wang J; Liu A; Bai X; Liu X
IEEE Trans Image Process; 2022; 31():598-611. PubMed ID: 34851825
[TBL] [Abstract][Full Text] [Related]
19. GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection.
Chen Y; Yang H; Wang X; Wang Q; Zhou H
Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981349
[TBL] [Abstract][Full Text] [Related]
20. Learning defense transformations for counterattacking adversarial examples.
Li J; Zhang S; Cao J; Tan M
Neural Netw; 2023 Jul; 164():177-185. PubMed ID: 37149918
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]