BIOMARKERS

Molecular Biopsy of Human Tumors

- a resource for Precision Medicine *

117 related articles for article (PubMed ID: 38906054)

  • 21. Adversarial attack vulnerability of medical image analysis systems: Unexplored factors.
    Bortsova G; González-Gonzalo C; Wetstein SC; Dubost F; Katramados I; Hogeweg L; Liefers B; van Ginneken B; Pluim JPW; Veta M; Sánchez CI; de Bruijne M
    Med Image Anal; 2021 Oct; 73():102141. PubMed ID: 34246850
    [TBL] [Abstract][Full Text] [Related]  

  • 22. Improving the Transferability of Adversarial Examples With a Noise Data Enhancement Framework and Random Erasing.
    Xie P; Shi S; Yang S; Qiao K; Liang N; Wang L; Chen J; Hu G; Yan B
    Front Neurorobot; 2021; 15():784053. PubMed ID: 34955802
    [TBL] [Abstract][Full Text] [Related]  

  • 23. Adversarial Examples for Hamming Space Search.
    Yang E; Liu T; Deng C; Tao D
    IEEE Trans Cybern; 2020 Apr; 50(4):1473-1484. PubMed ID: 30561358
    [TBL] [Abstract][Full Text] [Related]  

  • 24. DEFEAT: Decoupled feature attack across deep neural networks.
    Huang L; Gao C; Liu N
    Neural Netw; 2022 Dec; 156():13-28. PubMed ID: 36228335
    [TBL] [Abstract][Full Text] [Related]  

  • 25. Crafting Adversarial Perturbations via Transformed Image Component Swapping.
    Agarwal A; Ratha N; Vatsa M; Singh R
    IEEE Trans Image Process; 2022; 31():7338-7349. PubMed ID: 36094979
    [TBL] [Abstract][Full Text] [Related]  

  • 26. Untargeted white-box adversarial attack to break into deep leaning based COVID-19 monitoring face mask detection system.
    Sheikh BUH; Zafar A
    Multimed Tools Appl; 2023 May; ():1-27. PubMed ID: 37362697
    [TBL] [Abstract][Full Text] [Related]  

  • 27. MCGCL:Adversarial attack on graph contrastive learning based on momentum gradient candidates.
    Zhang Q; Qin Z; Zhang Y
    PLoS One; 2024; 19(6):e0302327. PubMed ID: 38843122
    [TBL] [Abstract][Full Text] [Related]  

  • 28. Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model.
    Zhang D; Dong Y
    Neural Netw; 2023 Oct; 167():730-740. PubMed ID: 37729788
    [TBL] [Abstract][Full Text] [Related]  

  • 29. Adversarial Attack Against Deep Saliency Models Powered by Non-Redundant Priors.
    Che Z; Borji A; Zhai G; Ling S; Li J; Tian Y; Guo G; Le Callet P
    IEEE Trans Image Process; 2021; 30():1973-1988. PubMed ID: 33444138
    [TBL] [Abstract][Full Text] [Related]  

  • 30. Mitigating Accuracy-Robustness Trade-Off Via Balanced Multi-Teacher Adversarial Distillation.
    Zhao S; Wang X; Wei X
    IEEE Trans Pattern Anal Mach Intell; 2024 Jun; PP():. PubMed ID: 38889035
    [TBL] [Abstract][Full Text] [Related]  

  • 31. Sparse Adversarial Video Attacks via Superpixel-Based Jacobian Computation.
    Du Z; Liu F; Yan X
    Sensors (Basel); 2022 May; 22(10):. PubMed ID: 35632095
    [TBL] [Abstract][Full Text] [Related]  

  • 32. Toward Intrinsic Adversarial Robustness Through Probabilistic Training.
    Dong J; Yang L; Wang Y; Xie X; Lai J
    IEEE Trans Image Process; 2023; 32():3862-3872. PubMed ID: 37428673
    [TBL] [Abstract][Full Text] [Related]  

  • 33. Gradient Correction for White-Box Adversarial Attacks.
    Liu H; Ge Z; Zhou Z; Shang F; Liu Y; Jiao L
    IEEE Trans Neural Netw Learn Syst; 2023 Oct; PP():. PubMed ID: 37819820
    [TBL] [Abstract][Full Text] [Related]  

  • 34. Efficient Robustness Assessment via Adversarial Spatial-Temporal Focus on Videos.
    Wei X; Wang S; Yan H
    IEEE Trans Pattern Anal Mach Intell; 2023 Sep; 45(9):10898-10912. PubMed ID: 37030872
    [TBL] [Abstract][Full Text] [Related]  

  • 35. Implicit adversarial data augmentation and robustness with Noise-based Learning.
    Panda P; Roy K
    Neural Netw; 2021 Sep; 141():120-132. PubMed ID: 33894652
    [TBL] [Abstract][Full Text] [Related]  

  • 36. Machine learning through cryptographic glasses: combating adversarial attacks by key-based diversified aggregation.
    Taran O; Rezaeifar S; Holotyak T; Voloshynovskiy S
    EURASIP J Inf Secur; 2020; 2020(1):10. PubMed ID: 32685910
    [TBL] [Abstract][Full Text] [Related]  

  • 37. Boosting the transferability of adversarial examples via stochastic serial attack.
    Hao L; Hao K; Wei B; Tang XS
    Neural Netw; 2022 Jun; 150():58-67. PubMed ID: 35305532
    [TBL] [Abstract][Full Text] [Related]  

  • 38. Local imperceptible adversarial attacks against human pose estimation networks.
    Liu F; Zhang S; Wang H; Yan C; Miao Y
    Vis Comput Ind Biomed Art; 2023 Nov; 6(1):22. PubMed ID: 37985638
    [TBL] [Abstract][Full Text] [Related]  

  • 39. Adaptive Cross-Modal Transferable Adversarial Attacks From Images to Videos.
    Wei Z; Chen J; Wu Z; Jiang YG
    IEEE Trans Pattern Anal Mach Intell; 2024 May; 46(5):3772-3783. PubMed ID: 38153825
    [TBL] [Abstract][Full Text] [Related]  

  • 40. Boosting Fast Adversarial Training With Learnable Adversarial Initialization.
    Jia X; Zhang Y; Wu B; Wang J; Cao X
    IEEE Trans Image Process; 2022; 31():4417-4430. PubMed ID: 35759600
    [TBL] [Abstract][Full Text] [Related]  

    [Previous]   [Next]    [New Search]
    of 6.