Academic literature on the topic 'Adversarial Attacker'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Adversarial Attacker.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Adversarial Attacker"
Park, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (2020): 8079. http://dx.doi.org/10.3390/app10228079.
Full textRosenberg, Ishai, Asaf Shabtai, Yuval Elovici, and Lior Rokach. "Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain." ACM Computing Surveys 54, no. 5 (2021): 1–36. http://dx.doi.org/10.1145/3453158.
Full textSutanto, Richard Evan, and Sukho Lee. "Real-Time Adversarial Attack Detection with Deep Image Prior Initialized as a High-Level Representation Based Blurring Network." Electronics 10, no. 1 (2020): 52. http://dx.doi.org/10.3390/electronics10010052.
Full textYang, Puyudi, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, and Michael Jordan. "ML-LOO: Detecting Adversarial Examples with Feature Attribution." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 6639–47. http://dx.doi.org/10.1609/aaai.v34i04.6140.
Full textChen, Yiding, and Xiaojin Zhu. "Optimal Attack against Autoregressive Models by Manipulating the Environment." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 3545–52. http://dx.doi.org/10.1609/aaai.v34i04.5760.
Full textZhang, Chaoning, Philipp Benz, Tooba Imtiaz, and In-So Kweon. "CD-UAP: Class Discriminative Universal Adversarial Perturbation." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 6754–61. http://dx.doi.org/10.1609/aaai.v34i04.6154.
Full textButts, Jonathan, Mason Rice, and Sujeet Shenoi. "An Adversarial Model for Expressing Attacks on Control Protocols." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 9, no. 3 (2012): 243–55. http://dx.doi.org/10.1177/1548512911449409.
Full textSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Full textChhabra, Anshuman, Abhishek Roy, and Prasant Mohapatra. "Suspicion-Free Adversarial Attacks on Clustering Algorithms." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 3625–32. http://dx.doi.org/10.1609/aaai.v34i04.5770.
Full textDankwa, Stephen, and Lu Yang. "Securing IoT Devices: A Robust and Efficient Deep Learning with a Mixed Batch Adversarial Generation Process for CAPTCHA Security Verification." Electronics 10, no. 15 (2021): 1798. http://dx.doi.org/10.3390/electronics10151798.
Full textDissertations / Theses on the topic "Adversarial Attacker"
Ammouri, Kevin. "Deep Reinforcement Learning for Temperature Control in Buildings and Adversarial Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-301052.
Full textAkdemir, Kahraman D. "Error Detection Techniques Against Strong Adversaries." Digital WPI, 2010. https://digitalcommons.wpi.edu/etd-dissertations/406.
Full textWorzyk, Steffen [Verfasser], Oliver [Akademischer Betreuer] Kramer, and Mike [Akademischer Betreuer] Preuss. "Adversarials−1: detecting adversarial inputs with internal attacks / Steffen Worzyk ; Oliver Kramer, Mike Preuss." Oldenburg : BIS der Universität Oldenburg, 2020. http://d-nb.info/1211724522/34.
Full textFält, Pontus. "ADVERSARIAL ATTACKS ON FACIAL RECOGNITION SYSTEMS." Thesis, Umeå universitet, Institutionen för datavetenskap, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-175887.
Full textFan, Zijian. "Applying Generative Adversarial Networks for the Generation of Adversarial Attacks Against Continuous Authentication." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-289634.
Full textKufel, Maciej. "Adversarial Attacks against Behavioral-based Continuous Authentication." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-285537.
Full textBurago, Igor. "Automated Attacks on Compression-Based Classifiers." Thesis, University of Oregon, 2014. http://hdl.handle.net/1794/18439.
Full textLi, Yuan Man. "SIFT-based image copy-move forgery detection and its adversarial attacks." Thesis, University of Macau, 2018. http://umaclib3.umac.mo/record=b3952093.
Full textSun, Michael(Michael Z. ). "Local approximations of deep learning models for black-box adversarial attacks." Thesis, Massachusetts Institute of Technology, 2019. https://hdl.handle.net/1721.1/121687.
Full textItani, Aashish. "COMPARISON OF ADVERSARIAL ROBUSTNESS OF ANN AND SNN TOWARDS BLACKBOX ATTACKS." OpenSIUC, 2021. https://opensiuc.lib.siu.edu/theses/2864.
Full textBooks on the topic "Adversarial Attacker"
Casola, Linda, and Dionna Ali, eds. Robust Machine Learning Algorithms and Systems for Detection and Mitigation of Adversarial Attacks and Anomalies. National Academies Press, 2019. http://dx.doi.org/10.17226/25534.
Full textPiepke, Joachim G., ed. P. Johann Frick SVD: Mao schlief in meinem Bett. Academia Verlag, 2020. http://dx.doi.org/10.5771/9783896659125.
Full textFreilich, Charles D. The Military Response Today. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0008.
Full textSandler, Todd. Terrorism. Oxford University Press, 2018. http://dx.doi.org/10.1093/wentk/9780190845841.001.0001.
Full textMorrell, Kit. ‘Certain gentlemen say…’. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780198788201.003.0012.
Full textFreilich, Charles D. The Changing Military Threat. Oxford University Press, 2018. http://dx.doi.org/10.1093/oso/9780190602932.003.0004.
Full textFranzinelli, Mimmo. Squadrism. Edited by R. J. B. Bosworth. Oxford University Press, 2012. http://dx.doi.org/10.1093/oxfordhb/9780199594788.013.0006.
Full textTsygankov, Andrei P. The Dark Double. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190919337.001.0001.
Full textBook chapters on the topic "Adversarial Attacker"
Chen, Xuguang, Hongbin Ma, Pujun Ji, Haiting Liu, and Yan Liu. "Based on GAN Generating Chaotic Sequence." In Communications in Computer and Information Science. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-33-4922-3_4.
Full textSpecht, Felix, and Jens Otto. "Hardening Deep Neural Networks in Condition Monitoring Systems against Adversarial Example Attacks." In Machine Learning for Cyber Physical Systems. Springer Berlin Heidelberg, 2020. http://dx.doi.org/10.1007/978-3-662-62746-4_11.
Full textGöpfert, Jan Philip, Heiko Wersing, and Barbara Hammer. "Recovering Localized Adversarial Attacks." In Artificial Neural Networks and Machine Learning – ICANN 2019: Theoretical Neural Computation. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30487-4_24.
Full textVasconcellos Vargas, Danilo. "Learning Systems Under Attack—Adversarial Attacks, Defenses and Beyond." In Autonomous Vehicles. Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-9255-3_7.
Full textPieters, Wolter, and Mohsen Davarynejad. "Calculating Adversarial Risk from Attack Trees: Control Strength and Probabilistic Attackers." In Data Privacy Management, Autonomous Spontaneous Security, and Security Assurance. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-17016-9_13.
Full textKurakin, Alexey, Ian Goodfellow, Samy Bengio, et al. "Adversarial Attacks and Defences Competition." In The NIPS '17 Competition: Building Intelligent Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-94042-7_11.
Full textJia, Shuai, Chao Ma, Yibing Song, and Xiaokang Yang. "Robust Tracking Against Adversarial Attacks." In Computer Vision – ECCV 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58529-7_5.
Full textZhou, Mo, Zhenxing Niu, Le Wang, Qilin Zhang, and Gang Hua. "Adversarial Ranking Attack and Defense." In Computer Vision – ECCV 2020. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-58568-6_46.
Full textYang, Yulin, and Guoquan Huang. "Map-Based Localization Under Adversarial Attacks." In Springer Proceedings in Advanced Robotics. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-28619-4_54.
Full textWorzyk, Nils, Hendrik Kahlen, and Oliver Kramer. "Physical Adversarial Attacks by Projecting Perturbations." In Lecture Notes in Computer Science. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-30508-6_51.
Full textConference papers on the topic "Adversarial Attacker"
Nguyen, Thanh H., Arunesh Sinha, and He He. "Partial Adversarial Behavior Deception in Security Games." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/40.
Full textLi, Yeni, Hany S. Abdel-Khalik, and Elisa Bertino. "Online Adversarial Learning of Reactor State." In 2018 26th International Conference on Nuclear Engineering. American Society of Mechanical Engineers, 2018. http://dx.doi.org/10.1115/icone26-82372.
Full textGong, Yuan, Boyang Li, Christian Poellabauer, and Yiyu Shi. "Real-Time Adversarial Attacks." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/649.
Full textGhafouri, Amin, Yevgeniy Vorobeychik, and Xenofon Koutsoukos. "Adversarial Regression for Detecting Attacks in Cyber-Physical Systems." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/524.
Full textLiu, Xuanqing, and Cho-Jui Hsieh. "Rob-GAN: Generator, Discriminator, and Adversarial Attacker." In 2019 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR). IEEE, 2019. http://dx.doi.org/10.1109/cvpr.2019.01149.
Full textWang, Kai. "Adversarial Machine Learning with Double Oracle." In Twenty-Eighth International Joint Conference on Artificial Intelligence {IJCAI-19}. International Joint Conferences on Artificial Intelligence Organization, 2019. http://dx.doi.org/10.24963/ijcai.2019/925.
Full textHajaj, Chen, and Yevgeniy Vorobeychik. "Adversarial Task Assignment." In Twenty-Seventh International Joint Conference on Artificial Intelligence {IJCAI-18}. International Joint Conferences on Artificial Intelligence Organization, 2018. http://dx.doi.org/10.24963/ijcai.2018/526.
Full textChen, Chengwei, Jing Liu, Yuan Xie, et al. "Latent Regularized Generative Dual Adversarial Network For Abnormal Detection." In Twenty-Ninth International Joint Conference on Artificial Intelligence and Seventeenth Pacific Rim International Conference on Artificial Intelligence {IJCAI-PRICAI-20}. International Joint Conferences on Artificial Intelligence Organization, 2020. http://dx.doi.org/10.24963/ijcai.2020/106.
Full textChipade, Vishnu S., and Dimitra Panagou. "Herding an Adversarial Attacker to a Safe Area for Defending Safety-Critical Infrastructure." In 2019 American Control Conference (ACC). IEEE, 2019. http://dx.doi.org/10.23919/acc.2019.8814380.
Full textHan, Hao, Li Cui, Wen Li, et al. "Radio Frequency Fingerprint Based Wireless Transmitter Identification Against Malicious Attacker: An Adversarial Learning Approach." In 2020 International Conference on Wireless Communications and Signal Processing (WCSP). IEEE, 2020. http://dx.doi.org/10.1109/wcsp49889.2020.9299859.
Full textReports on the topic "Adversarial Attacker"
Meyers, C., S. Powers, and D. Faissol. Taxonomies of Cyber Adversaries and Attacks: A Survey of Incidents and Approaches. Office of Scientific and Technical Information (OSTI), 2009. http://dx.doi.org/10.2172/967712.
Full text