These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.
138 related articles for article (PubMed ID: 38539780)
1. HAG-NET: Hiding Data and Adversarial Attacking with Generative Adversarial Network. Fan H; Wang J Entropy (Basel); 2024 Mar; 26(3):. PubMed ID: 38539780 [TBL] [Abstract][Full Text] [Related]
2. Adversarial Data Hiding in Digital Images. Wang D; Li M; Zhang Y Entropy (Basel); 2022 May; 24(6):. PubMed ID: 35741470 [TBL] [Abstract][Full Text] [Related]
3. Composition-Aware Image Steganography Through Adversarial Self-Generated Supervision. Zheng Z; Hu Y; Bin Y; Xu X; Yang Y; Shen HT IEEE Trans Neural Netw Learn Syst; 2023 Nov; 34(11):9451-9465. PubMed ID: 35679383 [TBL] [Abstract][Full Text] [Related]
4. Generative adversarial networks with decoder-encoder output noises. Zhong G; Gao W; Liu Y; Yang Y; Wang DH; Huang K Neural Netw; 2020 Jul; 127():19-28. PubMed ID: 32315932 [TBL] [Abstract][Full Text] [Related]
5. Generative adversarial network based synthetic data training model for lightweight convolutional neural networks. Rather IH; Kumar S Multimed Tools Appl; 2023 May; ():1-23. PubMed ID: 37362646 [TBL] [Abstract][Full Text] [Related]
6. Adversarial feature hybrid framework for steganography with shifted window local loss. Li Z; Yang X; Shen K; Jiang F; Jiang J; Ren H; Li Y Neural Netw; 2023 Aug; 165():358-369. PubMed ID: 37329780 [TBL] [Abstract][Full Text] [Related]
7. Feature Distillation in Deep Attention Network Against Adversarial Examples. Chen X; Weng J; Deng X; Luo W; Lan Y; Tian Q IEEE Trans Neural Netw Learn Syst; 2023 Jul; 34(7):3691-3705. PubMed ID: 34739380 [TBL] [Abstract][Full Text] [Related]
8. Adversarial Patch Attacks on Deep-Learning-Based Face Recognition Systems Using Generative Adversarial Networks. Hwang RH; Lin JY; Hsieh SY; Lin HY; Lin CL Sensors (Basel); 2023 Jan; 23(2):. PubMed ID: 36679651 [TBL] [Abstract][Full Text] [Related]
9. Generating adversarial examples without specifying a target model. Yang G; Li M; Fang X; Zhang J; Liang X PeerJ Comput Sci; 2021; 7():e702. PubMed ID: 34616888 [TBL] [Abstract][Full Text] [Related]
10. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond. Mu R; Marcolino L; Ni Q; Ruan W Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756 [TBL] [Abstract][Full Text] [Related]
11. Adversarial example defense based on image reconstruction. Zhang YA; Xu H; Pei C; Yang G PeerJ Comput Sci; 2021; 7():e811. PubMed ID: 35036533 [TBL] [Abstract][Full Text] [Related]
12. Fractional Wavelet-Based Generative Scattering Networks. Wu J; Qiu X; Zhang J; Wu F; Kong Y; Yang G; Senhadji L; Shu H Front Neurorobot; 2021; 15():752752. PubMed ID: 34764862 [TBL] [Abstract][Full Text] [Related]
13. Adversarial Margin Maximization Networks. Yan Z; Guo Y; Zhang C IEEE Trans Pattern Anal Mach Intell; 2021 Apr; 43(4):1129-1139. PubMed ID: 31634825 [TBL] [Abstract][Full Text] [Related]
14. Approaching Adversarial Example Classification with Chaos Theory. Pedraza A; Deniz O; Bueno G Entropy (Basel); 2020 Oct; 22(11):. PubMed ID: 33286969 [TBL] [Abstract][Full Text] [Related]
15. Uni-image: Universal image construction for robust neural model. Ho J; Lee BG; Kang DK Neural Netw; 2020 Aug; 128():279-287. PubMed ID: 32454372 [TBL] [Abstract][Full Text] [Related]
16. ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers. Cao H; Si C; Sun Q; Liu Y; Li S; Gope P Entropy (Basel); 2022 Mar; 24(3):. PubMed ID: 35327923 [TBL] [Abstract][Full Text] [Related]
17. Crafting Adversarial Perturbations via Transformed Image Component Swapping. Agarwal A; Ratha N; Vatsa M; Singh R IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979 [TBL] [Abstract][Full Text] [Related]
18. Generative Perturbation Network for Universal Adversarial Attacks on Brain-Computer Interfaces. Jung J; Moon H; Yu G; Hwang H IEEE J Biomed Health Inform; 2023 Nov; 27(11):5622-5633. PubMed ID: 37556336 [TBL] [Abstract][Full Text] [Related]
19. Rate-Distortion-Based Stego: A Large-Capacity Secure Steganography Scheme for Hiding Digital Images. Pan YL; Wu JL Entropy (Basel); 2022 Jul; 24(7):. PubMed ID: 35885204 [TBL] [Abstract][Full Text] [Related]
20. ApaNet: adversarial perturbations alleviation network for face verification. Sun G; Hu H; Su Y; Liu Q; Lu X Multimed Tools Appl; 2023; 82(5):7443-7461. PubMed ID: 36035322 [TBL] [Abstract][Full Text] [Related] [Next] [New Search]