BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

120 related articles for article (PubMed ID: 38855243)

  • 1. An adversarial example attack method based on predicted bounding box adaptive deformation in optical remote sensing images.
    Dai L; Wang J; Yang B; Chen F; Zhang H
    PeerJ Comput Sci; 2024; 10():e2053. PubMed ID: 38855243
    [TBL] [Abstract][Full Text] [Related]  

  • 2. Enhancing robustness in video recognition models: Sparse adversarial attacks and beyond.
    Mu R; Marcolino L; Ni Q; Ruan W
    Neural Netw; 2024 Mar; 171():127-143. PubMed ID: 38091756
    [TBL] [Abstract][Full Text] [Related]  

  • 3. Gradient Correction for White-Box Adversarial Attacks.
    Liu H; Ge Z; Zhou Z; Shang F; Liu Y; Jiao L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; PP():. PubMed ID: 37819820
    [TBL] [Abstract][Full Text] [Related]  

  • 4. Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing.
    Xie P; Shi S; Yang S; Qiao K; Liang N; Wang L; Chen J; Hu G; Yan B
    Front Neurorobot; 2021; 15():784053. PubMed ID: 34955802
    [TBL] [Abstract][Full Text] [Related]  

  • 5. Adaptive Perturbation for Adversarial Attack.
    Yuan Z; Zhang J; Jiang Z; Li L; Shan S
    IEEE Trans Pattern Anal Mach Intell; 2024 Feb; PP():. PubMed ID: 38376968
    [TBL] [Abstract][Full Text] [Related]  

  • 6. EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT.
    Li S; Wang J; Wang Y; Zhou G; Zhao Y
    Heliyon; 2023 Feb; 9(2):e13520. PubMed ID: 36846700
    [TBL] [Abstract][Full Text] [Related]  

  • 7. Strengthening transferability of adversarial examples by adaptive inertia and amplitude spectrum dropout.
    Li H; Yu W; Huang H
    Neural Netw; 2023 Aug; 165():925-937. PubMed ID: 37441909
    [TBL] [Abstract][Full Text] [Related]  

  • 8. Robustifying Deep Networks for Medical Image Segmentation.
    Liu Z; Zhang J; Jog V; Loh PL; McMillan AB
    J Digit Imaging; 2021 Oct; 34(5):1279-1293. PubMed ID: 34545476
    [TBL] [Abstract][Full Text] [Related]  

  • 9. Defending against adversarial attacks on Covid-19 classifier: A denoiser-based approach.
    Kansal K; Krishna PS; Jain PB; R S; Honnavalli P; Eswaran S
    Heliyon; 2022 Oct; 8(10):e11209. PubMed ID: 36311356
    [TBL] [Abstract][Full Text] [Related]  

  • 10. Improving Adversarial Robustness via Attention and Adversarial Logit Pairing.
    Li X; Goodman D; Liu J; Wei T; Dou D
    Front Artif Intell; 2021; 4():752831. PubMed ID: 35156010
    [TBL] [Abstract][Full Text] [Related]  

  • 11. Crafting Adversarial Perturbations via Transformed Image Component Swapping.
    Agarwal A; Ratha N; Vatsa M; Singh R
    IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979
    [TBL] [Abstract][Full Text] [Related]  

  • 12. Robust Medical Diagnosis: A Novel Two-Phase Deep Learning Framework for Adversarial Proof Disease Detection in Radiology Images.
    Haque SBU; Zafar A
    J Imaging Inform Med; 2024 Feb; 37(1):308-338. PubMed ID: 38343214
    [TBL] [Abstract][Full Text] [Related]  

  • 13. GLH: From Global to Local Gradient Attacks with High-Frequency Momentum Guidance for Object Detection.
    Chen Y; Yang H; Wang X; Wang Q; Zhou H
    Entropy (Basel); 2023 Mar; 25(3):. PubMed ID: 36981349
    [TBL] [Abstract][Full Text] [Related]  

  • 14. DEFEAT: Decoupled feature attack across deep neural networks.
    Huang L; Gao C; Liu N
    Neural Netw; 2022 Dec; 156():13-28. PubMed ID: 36228335
    [TBL] [Abstract][Full Text] [Related]  

  • 15. Untargeted white-box adversarial attack to break into deep leaning based COVID-19 monitoring face mask detection system.
    Sheikh BUH; Zafar A
    Multimed Tools Appl; 2023 May; ():1-27. PubMed ID: 37362697
    [TBL] [Abstract][Full Text] [Related]  

  • 16. Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems.
    Tian J; Wang B; Wang Z; Cao K; Li J; Ozay M
    IEEE Trans Cybern; 2022 Dec; 52(12):13699-13713. PubMed ID: 34797772
    [TBL] [Abstract][Full Text] [Related]  

  • 17. Improving Adversarial Robustness Against Universal Patch Attacks Through Feature Norm Suppressing.
    Yu C; Chen J; Wang Y; Xue Y; Ma H
    IEEE Trans Neural Netw Learn Syst; 2023 Nov; PP():. PubMed ID: 37917525
    [TBL] [Abstract][Full Text] [Related]  

  • 18. Adversarial Attacks against Deep-Learning-Based Automatic Dependent Surveillance-Broadcast Unsupervised Anomaly Detection Models in the Context of Air Traffic Management.
    Luo P; Wang B; Tian J; Liu C; Yang Y
    Sensors (Basel); 2024 Jun; 24(11):. PubMed ID: 38894375
    [TBL] [Abstract][Full Text] [Related]  

  • 19. Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model.
    Zhang D; Dong Y
    Neural Netw; 2023 Oct; 167():730-740. PubMed ID: 37729788
    [TBL] [Abstract][Full Text] [Related]  

  • 20. Differential evolution based dual adversarial camouflage: Fooling human eyes and object detectors.
    Sun J; Yao W; Jiang T; Wang D; Chen X
    Neural Netw; 2023 Jun; 163():256-271. PubMed ID: 37086543
    [TBL] [Abstract][Full Text] [Related]  

    [Next]    [New Search]
    of 6.