Journal articles on the topic 'Adversarial Attacker'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adversarial Attacker.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Park, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (2020): 8079. http://dx.doi.org/10.3390/app10228079.
Full textRosenberg, Ishai, Asaf Shabtai, Yuval Elovici, and Lior Rokach. "Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain." ACM Computing Surveys 54, no. 5 (2021): 1–36. http://dx.doi.org/10.1145/3453158.
Full textSutanto, Richard Evan, and Sukho Lee. "Real-Time Adversarial Attack Detection with Deep Image Prior Initialized as a High-Level Representation Based Blurring Network." Electronics 10, no. 1 (2020): 52. http://dx.doi.org/10.3390/electronics10010052.
Full textYang, Puyudi, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, and Michael Jordan. "ML-LOO: Detecting Adversarial Examples with Feature Attribution." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 6639–47. http://dx.doi.org/10.1609/aaai.v34i04.6140.
Full textChen, Yiding, and Xiaojin Zhu. "Optimal Attack against Autoregressive Models by Manipulating the Environment." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 3545–52. http://dx.doi.org/10.1609/aaai.v34i04.5760.
Full textZhang, Chaoning, Philipp Benz, Tooba Imtiaz, and In-So Kweon. "CD-UAP: Class Discriminative Universal Adversarial Perturbation." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 6754–61. http://dx.doi.org/10.1609/aaai.v34i04.6154.
Full textButts, Jonathan, Mason Rice, and Sujeet Shenoi. "An Adversarial Model for Expressing Attacks on Control Protocols." Journal of Defense Modeling and Simulation: Applications, Methodology, Technology 9, no. 3 (2012): 243–55. http://dx.doi.org/10.1177/1548512911449409.
Full textSaha, Aniruddha, Akshayvarun Subramanya, and Hamed Pirsiavash. "Hidden Trigger Backdoor Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (2020): 11957–65. http://dx.doi.org/10.1609/aaai.v34i07.6871.
Full textChhabra, Anshuman, Abhishek Roy, and Prasant Mohapatra. "Suspicion-Free Adversarial Attacks on Clustering Algorithms." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 3625–32. http://dx.doi.org/10.1609/aaai.v34i04.5770.
Full textDankwa, Stephen, and Lu Yang. "Securing IoT Devices: A Robust and Efficient Deep Learning with a Mixed Batch Adversarial Generation Process for CAPTCHA Security Verification." Electronics 10, no. 15 (2021): 1798. http://dx.doi.org/10.3390/electronics10151798.
Full textYang, Runze, and Teng Long. "Derivative-free optimization adversarial attacks for graph convolutional networks." PeerJ Computer Science 7 (August 24, 2021): e693. http://dx.doi.org/10.7717/peerj-cs.693.
Full textXu, Guangquan, Guofeng Feng, Litao Jiao, Meiqi Feng, Xi Zheng, and Jian Liu. "FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services." Security and Communication Networks 2021 (September 6, 2021): 1–10. http://dx.doi.org/10.1155/2021/5395705.
Full textDu, Xiaohu, Jie Yu, Zibo Yi, et al. "A Hybrid Adversarial Attack for Different Application Scenarios." Applied Sciences 10, no. 10 (2020): 3559. http://dx.doi.org/10.3390/app10103559.
Full textChang, Heng, Yu Rong, Tingyang Xu, et al. "A Restricted Black-Box Adversarial Framework Towards Attacking Graph Embedding Models." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 3389–96. http://dx.doi.org/10.1609/aaai.v34i04.5741.
Full textPapadopoulos, Pavlos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, and William J. Buchanan. "Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT." Journal of Cybersecurity and Privacy 1, no. 2 (2021): 252–73. http://dx.doi.org/10.3390/jcp1020014.
Full textTu, Chun-Chen, Paishun Ting, Pin-Yu Chen, et al. "AutoZOOM: Autoencoder-Based Zeroth Order Optimization Method for Attacking Black-Box Neural Networks." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 742–49. http://dx.doi.org/10.1609/aaai.v33i01.3301742.
Full textMiller, David, Yujia Wang, and George Kesidis. "When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time." Neural Computation 31, no. 8 (2019): 1624–70. http://dx.doi.org/10.1162/neco_a_01209.
Full textLee, Sun Woo, Sok Joon Lee, and Dong Hoon Lee. "Attack on Vehicular Platooning and Mitigation Strategy: A Survey." Applied Mechanics and Materials 865 (June 2017): 423–28. http://dx.doi.org/10.4028/www.scientific.net/amm.865.423.
Full textYang, Gaoming, Mingwei Li, Xianjing Fang, Ji Zhang, and Xingzhu Liang. "Generating adversarial examples without specifying a target model." PeerJ Computer Science 7 (September 13, 2021): e702. http://dx.doi.org/10.7717/peerj-cs.702.
Full textShirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Chuck Anderson. "Directed adversarial sampling attacks on phishing detection." Journal of Computer Security 29, no. 1 (2021): 1–23. http://dx.doi.org/10.3233/jcs-191411.
Full textTondi, Benedetta, Neri Merhav, and Mauro Barni. "Detection Games under Fully Active Adversaries." Entropy 21, no. 1 (2018): 23. http://dx.doi.org/10.3390/e21010023.
Full textChen, Lili, Zhen Wang, Fenghua Li, Yunchuan Guo, and Kui Geng. "A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things." Sensors 20, no. 3 (2020): 804. http://dx.doi.org/10.3390/s20030804.
Full textZhao, Jinxiong, Xun Zhang, Fuqiang Di, et al. "Exploring the Optimum Proactive Defense Strategy for the Power Systems from an Attack Perspective." Security and Communication Networks 2021 (February 12, 2021): 1–14. http://dx.doi.org/10.1155/2021/6699108.
Full textPal, Soham, Yash Gupta, Aditya Shukla, Aditya Kanade, Shirish Shevade, and Vinod Ganapathy. "ActiveThief: Model Extraction Using Active Learning and Unannotated Public Data." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 865–72. http://dx.doi.org/10.1609/aaai.v34i01.5432.
Full textTong, Liang, Aron Laszka, Chao Yan, Ning Zhang, and Yevgeniy Vorobeychik. "Finding Needles in a Moving Haystack: Prioritizing Alerts with Adversarial Reinforcement Learning." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 01 (2020): 946–53. http://dx.doi.org/10.1609/aaai.v34i01.5442.
Full textNiu, L., Y. Song, J. Chu, and S. Li. "ANALYSIS OF THE ATTACKER AND DEFENDER GAN MODELS FOR THE INDOOR NAVIGATION NETWORK." International Archives of the Photogrammetry, Remote Sensing and Spatial Information Sciences XLIII-B4-2021 (June 30, 2021): 237–42. http://dx.doi.org/10.5194/isprs-archives-xliii-b4-2021-237-2021.
Full textWachter, Jasmin, Stefan Rass, and Sandra König. "Security from the Adversary’s Inertia–Controlling Convergence Speed When Playing Mixed Strategy Equilibria." Games 9, no. 3 (2018): 59. http://dx.doi.org/10.3390/g9030059.
Full textYang, Wenjie, Jian Weng, Weiqi Luo, and Anjia Yang. "Strongly Unforgeable Certificateless Signature Resisting Attacks from Malicious-But-Passive KGC." Security and Communication Networks 2017 (2017): 1–8. http://dx.doi.org/10.1155/2017/5704865.
Full textRoponen, Juho, and Ahti Salo. "Adversarial Risk Analysis for Enhancing Combat Simulation Models." Journal of Military Studies 6, no. 2 (2015): 82–103. http://dx.doi.org/10.1515/jms-2016-0200.
Full textLiu, Xu, Xiaoqiang Di, Jinqing Li, et al. "Allocating Limited Resources to Protect a Massive Number of Targets Using a Game Theoretic Model." Mathematical Problems in Engineering 2019 (March 13, 2019): 1–16. http://dx.doi.org/10.1155/2019/5475341.
Full textMeng, Sascha, Marcus Wiens, and Frank Schultmann. "Adversarial risks in the lab – An experimental study of framing-effects in attacker-defender games." Safety Science 120 (December 2019): 551–60. http://dx.doi.org/10.1016/j.ssci.2019.08.004.
Full textKalbantner, Jan, Konstantinos Markantonakis, Darren Hurley-Smith, Raja Naeem Akram, and Benjamin Semal. "P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time." Energies 14, no. 3 (2021): 606. http://dx.doi.org/10.3390/en14030606.
Full textGao, Xianfeng, Yu-an Tan, Hongwei Jiang, Quanxin Zhang, and Xiaohui Kuang. "Boosting Targeted Black-Box Attacks via Ensemble Substitute Training and Linear Augmentation." Applied Sciences 9, no. 11 (2019): 2286. http://dx.doi.org/10.3390/app9112286.
Full textJaiswal, Mimansa, and Emily Mower Provost. "Privacy Enhanced Multimodal Neural Representations for Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 05 (2020): 7985–93. http://dx.doi.org/10.1609/aaai.v34i05.6307.
Full textLiu, Ninghao, Mengnan Du, Ruocheng Guo, Huan Liu, and Xia Hu. "Adversarial Attacks and Defenses." ACM SIGKDD Explorations Newsletter 23, no. 1 (2021): 86–99. http://dx.doi.org/10.1145/3468507.3468519.
Full textZheng, Tianhang, Changyou Chen, and Kui Ren. "Distributionally Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 2253–60. http://dx.doi.org/10.1609/aaai.v33i01.33012253.
Full textSagar, Ramani, Rutvij Jhaveri, and Carlos Borrego. "Applications in Security and Evasions in Machine Learning: A Survey." Electronics 9, no. 1 (2020): 97. http://dx.doi.org/10.3390/electronics9010097.
Full textImam, Niddal H., and Vassilios G. Vassilakis. "A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment." Robotics 8, no. 3 (2019): 50. http://dx.doi.org/10.3390/robotics8030050.
Full textAn, Bo, Eric Shieh, Milind Tambe, et al. "PROTECT -- A Deployed Game Theoretic System for Strategic Security Allocation for the United States Coast Guard." AI Magazine 33, no. 4 (2012): 96. http://dx.doi.org/10.1609/aimag.v33i4.2401.
Full textPark, Hosung, Gwonsang Ryu, and Daeseon Choi. "Partial Retraining Substitute Model for Query-Limited Black-Box Attacks." Applied Sciences 10, no. 20 (2020): 7168. http://dx.doi.org/10.3390/app10207168.
Full textJiang, Yan, Guisheng Yin, Ye Yuan, and Qingan Da. "Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification." Security and Communication Networks 2021 (June 12, 2021): 1–13. http://dx.doi.org/10.1155/2021/6663028.
Full textZhang, Jing, Shifei Shen, and Rui Yang. "The impacts of adaptive attacking and defending strategies on mitigation of intentional threats." Kybernetes 39, no. 5 (2010): 825–37. http://dx.doi.org/10.1108/03684921011043279.
Full textHu, Yongjin, Jin Tian, and Jun Ma. "A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification." Wireless Communications and Mobile Computing 2021 (August 23, 2021): 1–12. http://dx.doi.org/10.1155/2021/7367107.
Full textZhao, Chenxiao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, and Chaomin Shen. "The Adversarial Attack and Detection under the Fisher Information Metric." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 5869–76. http://dx.doi.org/10.1609/aaai.v33i01.33015869.
Full textKim, Yongsu, Hyoeun Kang, Naufal Suryanto, Harashta Tatimma Larasati, Afifatul Mukaroh, and Howon Kim. "Extended Spatially Localized Perturbation GAN (eSLP-GAN) for Robust Adversarial Camouflage Patches." Sensors 21, no. 16 (2021): 5323. http://dx.doi.org/10.3390/s21165323.
Full textHaq, Ijaz Ul, Zahid Younas Khan, Arshad Ahmad, et al. "Evaluating and Enhancing the Robustness of Sustainable Neural Relationship Classifiers Using Query-Efficient Black-Box Adversarial Attacks." Sustainability 13, no. 11 (2021): 5892. http://dx.doi.org/10.3390/su13115892.
Full textChe, Zhaohui, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, and Patrick Le Callet. "A New Ensemble Adversarial Attack Powered by Long-Term Gradient Memories." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (2020): 3405–13. http://dx.doi.org/10.1609/aaai.v34i04.5743.
Full textShi, Zheyuan Ryan, Aaron Schlenker, Brian Hay, et al. "Draining the Water Hole: Mitigating Social Engineering Attacks with CyberTWEAK." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 08 (2020): 13363–68. http://dx.doi.org/10.1609/aaai.v34i08.7050.
Full textQureshi, Ayyaz Ul Haq, Hadi Larijani, Mehdi Yousefi, Ahsan Adeel, and Nhamoinesu Mtetwa. "An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm." Computers 9, no. 3 (2020): 58. http://dx.doi.org/10.3390/computers9030058.
Full textMao, Junjie, Bin Weng, Tianqiang Huang, Feng Ye, and Liqing Huang. "Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks." Security and Communication Networks 2021 (August 9, 2021): 1–12. http://dx.doi.org/10.1155/2021/3670339.
Full text