These tools will no longer be maintained as of December 31, 2024. Archived website can be found here. PubMed4Hh GitHub repository can be found here. Contact NLM Customer Service if you have questions.


BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

133 related articles for article (PubMed ID: 38587963)

  • 21. A veracity dissemination consistency-based few-shot fake news detection framework by synergizing adversarial and contrastive self-supervised learning.
    Jin W; Wang N; Tao T; Shi B; Bi H; Zhao B; Wu H; Duan H; Yang G
    Sci Rep; 2024 Aug; 14(1):19470. PubMed ID: 39174581
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Adversarial example defense based on image reconstruction.
    Zhang YA; Xu H; Pei C; Yang G
    PeerJ Comput Sci; 2021; 7():e811. PubMed ID: 35036533
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Hierarchical binding in convolutional neural networks: Making adversarial attacks geometrically challenging.
    Leadholm N; Stringer S
    Neural Netw; 2022 Nov; 155():258-286. PubMed ID: 36081198
    [TBL] [Abstract][Full Text] [Related]  

  • 24. Exploring Adversarial Robustness of LiDAR Semantic Segmentation in Autonomous Driving.
    Mahima KTY; Perera A; Anavatti S; Garratt M
    Sensors (Basel); 2023 Dec; 23(23):. PubMed ID: 38067951
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Robustifying Deep Networks for Medical Image Segmentation.
    Liu Z; Zhang J; Jog V; Loh PL; McMillan AB
    J Digit Imaging; 2021 Oct; 34(5):1279-1293. PubMed ID: 34545476
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.
    Mu R; Marcolino L; Ni Q; Ruan W
    Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756
    [TBL] [Abstract][Full Text] [Related]  

  • 27. Crafting Adversarial Perturbations via Transformed Image Component Swapping.
    Agarwal A; Ratha N; Vatsa M; Singh R
    IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Towards Robust Person Re-Identification by Defending Against Universal Attackers.
    Yang F; Weng J; Zhong Z; Liu H; Wang Z; Luo Z; Cao D; Li S; Satoh S; Sebe N
    IEEE Trans Pattern Anal Mach Intell; 2023 Apr; 45(4):5218-5235. PubMed ID: 35969571
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
    Li X; Goodman D; Liu J; Wei T; Dou D
    Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Defense Against Adversarial Attacks by Reconstructing Images.
    Zhang S; Gao H; Rao Q
    IEEE Trans Image Process; 2021; 30():6117-6129. PubMed ID: 34197323
    [TBL] [Abstract][Full Text] [Related]  

  • 31. RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic.
    Alkadi S; Al-Ahmadi S; Ben Ismail MM
    Sensors (Basel); 2024 Apr; 24(8):. PubMed ID: 38676241
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Local imperceptible adversarial attacks against human pose estimation networks.
    Liu F; Zhang S; Wang H; Yan C; Miao Y
    Vis Comput Ind Biomed Art; 2023 Nov; 6(1):22. PubMed ID: 37985638
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Between-Class Adversarial Training for Improving Adversarial Robustness of Image Classification.
    Wang D; Jin W; Wu Y
    Sensors (Basel); 2023 Mar; 23(6):. PubMed ID: 36991962
    [TBL] [Abstract][Full Text] [Related]  

  • 34. GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection.
    Chen Y; Yang H; Wang X; Wang Q; Zhou H
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981349
    [TBL] [Abstract][Full Text] [Related]  

  • 35. DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model.
    Liu R; Jin X; Hu D; Zhang J; Wang Y; Zhang J; Zhou W
    Front Neurorobot; 2023; 17():1129720. PubMed ID: 36845066
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Adversarial Robustness Enhancement for Deep Learning-Based Soft Sensors: An Adversarial Training Strategy Using Historical Gradients and Domain Adaptation.
    Guo R; Chen Q; Liu H; Wang W
    Sensors (Basel); 2024 Jun; 24(12):. PubMed ID: 38931693
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Enhancing the robustness of vision transformer defense against adversarial attacks based on squeeze-and-excitation module.
    Chang Y; Zhao H; Wang W
    PeerJ Comput Sci; 2023; 9():e1197. PubMed ID: 37346601
    [TBL] [Abstract][Full Text] [Related]  

  • 38. On the role of deep learning model complexity in adversarial robustness for medical images.
    Rodriguez D; Nayak T; Chen Y; Krishnan R; Huang Y
    BMC Med Inform Decis Mak; 2022 Jun; 22(Suppl 2):160. PubMed ID: 35725429
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Image classification adversarial attack with improved resizing transformation and ensemble models.
    Li C; Zhang H; Yang B; Wang J
    PeerJ Comput Sci; 2023; 9():e1475. PubMed ID: 37547405
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
    Taran O; Rezaeifar S; Holotyak T; Voloshynovskiy S
    EURASIP J Inf Secur; 2020; 2020(1):10. PubMed ID: 32685910
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 7.