BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

137 related articles for article (PubMed ID: 38402810)

  • 1. Defense against adversarial attacks based on color space transformation.
    Wang H; Wu C; Zheng K
    Neural Netw; 2024 May; 173():106176. PubMed ID: 38402810
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Privacy Preserving Defense For Black Box Classifiers Against On-Line Adversarial Attacks.
    Theagarajan R; Bhanu B
    IEEE Trans Pattern Anal Mach Intell; 2022 Dec; 44(12):9503-9520. PubMed ID: 34748482
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
    Li X; Goodman D; Liu J; Wei T; Dou D
    Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model.
    Zhang D; Dong Y
    Neural Netw; 2023 Oct; 167():730-740. PubMed ID: 37729788
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Meta Invariance Defense Towards Generalizable Robustness to Unknown Adversarial Attacks.
    Zhang L; Zhou Y; Yang Y; Gao X
    IEEE Trans Pattern Anal Mach Intell; 2024 Apr; PP():. PubMed ID: 38587963
    [TBL] [Abstract][Full Text] [Related]  

  • 6. Between-Class Adversarial Training for Improving Adversarial Robustness of Image Classification.
    Wang D; Jin W; Wu Y
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991962
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Crafting Adversarial Perturbations via Transformed Image Component Swapping.
    Agarwal A; Ratha N; Vatsa M; Singh R
    IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979
    [TBL] [Abstract][Full Text] [Related]  

  • 8. DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.
    Liu R; Jin X; Hu D; Zhang J; Wang Y; Zhang J; Zhou W
    Front Neurorobot; 2023; 17():1129720. PubMed ID: 36845066
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Towards evaluating the robustness of deep diagnostic models by adversarial attack.
    Xu M; Zhang T; Li Z; Liu M; Zhang D
    Med Image Anal; 2021 Apr; 69():101977. PubMed ID: 33550005
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Sinkhorn Adversarial Attack and Defense.
    Subramanyam AV
    IEEE Trans Image Process; 2022; 31():4039-4049. PubMed ID: 35679377
    [TBL] [Abstract][Full Text] [Related]  

  • 11. DAMAD: Database, Attack, and Model Agnostic Adversarial Perturbation Detector.
    Agarwal A; Goswami G; Vatsa M; Singh R; Ratha NK
    IEEE Trans Neural Netw Learn Syst; 2022 Aug; 33(8):3277-3289. PubMed ID: 33710959
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.
    Mu R; Marcolino L; Ni Q; Ruan W
    Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756
    [TBL] [Abstract][Full Text] [Related]  

  • 13. Feature Distillation in Deep Attention Network Against Adversarial Examples.
    Chen X; Weng J; Deng X; Luo W; Lan Y; Tian Q
    IEEE Trans Neural Netw Learn Syst; 2023 Jul; 34(7):3691-3705. PubMed ID: 34739380
    [TBL] [Abstract][Full Text] [Related]  

  • 14. Progressive Diversified Augmentation for General Robustness of DNNs: A Unified Approach.
    Yu H; Liu A; Li G; Yang J; Zhang C
    IEEE Trans Image Process; 2021; 30():8955-8967. PubMed ID: 34699360
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Uni-image: Universal image construction for robust neural model.
    Ho J; Lee BG; Kang DK
    Neural Netw; 2020 Aug; 128():279-287. PubMed ID: 32454372
    [TBL] [Abstract][Full Text] [Related]  

  • 16. FAD: Fine-Grained Adversarial Detection by Perturbation Intensity Classification.
    Yang JT; Jiang H; Li H; Ye DS; Jiang W
    Entropy (Basel); 2023 Feb; 25(2):. PubMed ID: 36832701
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Adversarial example defense based on image reconstruction.
    Zhang YA; Xu H; Pei C; Yang G
    PeerJ Comput Sci; 2021; 7():e811. PubMed ID: 35036533
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Learning defense transformations for counterattacking adversarial examples.
    Li J; Zhang S; Cao J; Tan M
    Neural Netw; 2023 Jul; 164():177-185. PubMed ID: 37149918
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems.
    Wang S; Cao Y; Chen X; Yao L; Wang X; Sheng QZ
    Front Big Data; 2022; 5():822783. PubMed ID: 35592793
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Adversarial Attack and Defense in Deep Ranking.
    Zhou M; Wang L; Niu Z; Zhang Q; Zheng N; Hua G
    IEEE Trans Pattern Anal Mach Intell; 2024 Feb; PP():. PubMed ID: 38349823
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 7.