137 related articles for article (PubMed ID: 38402810)
1. Defense against adversarial attacks based on color space transformation.
Wang H; Wu C; Zheng K
Neural Netw; 2024 May; 173():106176. PubMed ID: 38402810
[TBL] [Abstract][Full Text] [Related]
2. Privacy Preserving Defense For Black Box Classifiers Against On-Line Adversarial Attacks.
Theagarajan R; Bhanu B
IEEE Trans Pattern Anal Mach Intell; 2022 Dec; 44(12):9503-9520. PubMed ID: 34748482
[TBL] [Abstract][Full Text] [Related]
3. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
Li X; Goodman D; Liu J; Wei T; Dou D
Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010
[TBL] [Abstract][Full Text] [Related]
4. Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model.
Zhang D; Dong Y
Neural Netw; 2023 Oct; 167():730-740. PubMed ID: 37729788
[TBL] [Abstract][Full Text] [Related]
5. Meta Invariance Defense Towards Generalizable Robustness to Unknown Adversarial Attacks.
Zhang L; Zhou Y; Yang Y; Gao X
IEEE Trans Pattern Anal Mach Intell; 2024 Apr; PP():. PubMed ID: 38587963
[TBL] [Abstract][Full Text] [Related]
6. Between-Class Adversarial Training for Improving Adversarial Robustness of Image Classification.
Wang D; Jin W; Wu Y
Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991962
[TBL] [Abstract][Full Text] [Related]
7. Crafting Adversarial Perturbations via Transformed Image Component Swapping.
Agarwal A; Ratha N; Vatsa M; Singh R
IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979
[TBL] [Abstract][Full Text] [Related]
8. DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.
Liu R; Jin X; Hu D; Zhang J; Wang Y; Zhang J; Zhou W
Front Neurorobot; 2023; 17():1129720. PubMed ID: 36845066
[TBL] [Abstract][Full Text] [Related]
9. Towards evaluating the robustness of deep diagnostic models by adversarial attack.
Xu M; Zhang T; Li Z; Liu M; Zhang D
Med Image Anal; 2021 Apr; 69():101977. PubMed ID: 33550005
[TBL] [Abstract][Full Text] [Related]
10. Sinkhorn Adversarial Attack and Defense.
Subramanyam AV
IEEE Trans Image Process; 2022; 31():4039-4049. PubMed ID: 35679377
[TBL] [Abstract][Full Text] [Related]
11. DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector.
Agarwal A; Goswami G; Vatsa M; Singh R; Ratha NK
IEEE Trans Neural Netw Learn Syst; 2022 Aug; 33(8):3277-3289. PubMed ID: 33710959
[TBL] [Abstract][Full Text] [Related]
12. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.
Mu R; Marcolino L; Ni Q; Ruan W
Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756
[TBL] [Abstract][Full Text] [Related]
13. Feature Distillation in Deep Attention Network Against Adversarial Examples.
Chen X; Weng J; Deng X; Luo W; Lan Y; Tian Q
IEEE Trans Neural Netw Learn Syst; 2023 Jul; 34(7):3691-3705. PubMed ID: 34739380
[TBL] [Abstract][Full Text] [Related]
14. Progressive Diversified Augmentation for General Robustness of DNNs: A Unified Approach.
Yu H; Liu A; Li G; Yang J; Zhang C
IEEE Trans Image Process; 2021; 30():8955-8967. PubMed ID: 34699360
[TBL] [Abstract][Full Text] [Related]
15. Uni-image: Universal image construction for robust neural model.
Ho J; Lee BG; Kang DK
Neural Netw; 2020 Aug; 128():279-287. PubMed ID: 32454372
[TBL] [Abstract][Full Text] [Related]
16. FAD: Fine-Grained Adversarial Detection by Perturbation Intensity Classification.
Yang JT; Jiang H; Li H; Ye DS; Jiang W
Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832701
[TBL] [Abstract][Full Text] [Related]
17. Adversarial example defense based on image reconstruction.
Zhang YA; Xu H; Pei C; Yang G
PeerJ Comput Sci; 2021; 7():e811. PubMed ID: 35036533
[TBL] [Abstract][Full Text] [Related]
18. Learning defense transformations for counterattacking adversarial examples.
Li J; Zhang S; Cao J; Tan M
Neural Netw; 2023 Jul; 164():177-185. PubMed ID: 37149918
[TBL] [Abstract][Full Text] [Related]
19. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems.
Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ
Front Big Data; 2022; 5():822783. PubMed ID: 35592793
[TBL] [Abstract][Full Text] [Related]
20. Adversarial Attack and Defense in Deep Ranking.
Zhou M; Wang L; Niu Z; Zhang Q; Zheng N; Hua G
IEEE Trans Pattern Anal Mach Intell; 2024 Feb; PP():. PubMed ID: 38349823
[TBL] [Abstract][Full Text] [Related]
[Next] [New Search]