These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
131 related articles for article (PubMed ID: 37831567)
1. LAFIT: Efficient and Reliable Evaluation of Adversarial Defenses With Latent Features. Yu Y; Gao X; Xu CZ IEEE Trans Pattern Anal Mach Intell; 2024 Jan; 46(1):354-369. PubMed ID: 37831567 [TBL] [Abstract][Full Text] [Related]
2. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond. Mu R; Marcolino L; Ni Q; Ruan W Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756 [TBL] [Abstract][Full Text] [Related]
3. Deeply Supervised Discriminative Learning for Adversarial Defense. Mustafa A; Khan SH; Hayat M; Goecke R; Shen J; Shao L IEEE Trans Pattern Anal Mach Intell; 2021 Sep; 43(9):3154-3166. PubMed ID: 32149623 [TBL] [Abstract][Full Text] [Related]
4. Adversarial Attack and Defense in Deep Ranking. Zhou M; Wang L; Niu Z; Zhang Q; Zheng N; Hua G IEEE Trans Pattern Anal Mach Intell; 2024 Aug; 46(8):5306-5324. PubMed ID: 38349823 [TBL] [Abstract][Full Text] [Related]
5. DEFEAT: Decoupled feature attack across deep neural networks. Huang L; Gao C; Liu N Neural Netw; 2022 Dec; 156():13-28. PubMed ID: 36228335 [TBL] [Abstract][Full Text] [Related]
6. ApaNet: adversarial perturbations alleviation network for face verification. Sun G; Hu H; Su Y; Liu Q; Lu X Multimed Tools Appl; 2023; 82(5):7443-7461. PubMed ID: 36035322 [TBL] [Abstract][Full Text] [Related]
7. Stylized Adversarial Defense. Naseer M; Khan S; Hayat M; Khan FS; Porikli F IEEE Trans Pattern Anal Mach Intell; 2023 May; 45(5):6403-6414. PubMed ID: 36121953 [TBL] [Abstract][Full Text] [Related]
8. Improving Adversarial Robustness Against Universal Patch Attacks Through Feature Norm Suppressing. Yu C; Chen J; Wang Y; Xue Y; Ma H IEEE Trans Neural Netw Learn Syst; 2023 Nov; PP():. PubMed ID: 37917525 [TBL] [Abstract][Full Text] [Related]
9. Defending the Defender: Adversarial Learning Based Defending Strategy for Learning Based Security Methods in Cyber-Physical Systems (CPS). Sheikh ZA; Singh Y; Singh PK; Gonçalves PJS Sensors (Basel); 2023 Jun; 23(12):. PubMed ID: 37420626 [TBL] [Abstract][Full Text] [Related]
10. Guidance Through Surrogate: Toward a Generic Diagnostic Attack. Naseer M; Khan S; Porikli F; Khan FS IEEE Trans Neural Netw Learn Syst; 2024 Feb; 35(2):2042-2053. PubMed ID: 35816520 [TBL] [Abstract][Full Text] [Related]
11. Towards evaluating the robustness of deep diagnostic models by adversarial attack. Xu M; Zhang T; Li Z; Liu M; Zhang D Med Image Anal; 2021 Apr; 69():101977. PubMed ID: 33550005 [TBL] [Abstract][Full Text] [Related]
12. Model Compression Hardens Deep Neural Networks: A New Perspective to Prevent Adversarial Attacks. Liu Q; Wen W IEEE Trans Neural Netw Learn Syst; 2023 Jan; 34(1):3-14. PubMed ID: 34181553 [TBL] [Abstract][Full Text] [Related]
13. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems. Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ Front Big Data; 2022; 5():822783. PubMed ID: 35592793 [TBL] [Abstract][Full Text] [Related]
15. GradDiv: Adversarial Robustness of Randomized Neural Networks via Gradient Diversity Regularization. Lee S; Kim H; Lee J IEEE Trans Pattern Anal Mach Intell; 2023 Feb; 45(2):2645-2651. PubMed ID: 35446760 [TBL] [Abstract][Full Text] [Related]
16. Implicit adversarial data augmentation and robustness with Noise-based Learning. Panda P; Roy K Neural Netw; 2021 Sep; 141():120-132. PubMed ID: 33894652 [TBL] [Abstract][Full Text] [Related]
17. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing. Li X; Goodman D; Liu J; Wei T; Dou D Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010 [TBL] [Abstract][Full Text] [Related]
18. Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples. Mahmood K; Gurevin D; van Dijk M; Nguyen PH Entropy (Basel); 2021 Oct; 23(10):. PubMed ID: 34682083 [TBL] [Abstract][Full Text] [Related]
19. Crafting Adversarial Perturbations via Transformed Image Component Swapping. Agarwal A; Ratha N; Vatsa M; Singh R IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979 [TBL] [Abstract][Full Text] [Related]
20. Defending Against Multiple and Unforeseen Adversarial Videos. Lo SY; Patel VM IEEE Trans Image Process; 2022; 31():962-973. PubMed ID: 34965207 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]