Journal articles on the topic 'Adversarial samples'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adversarial samples.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Liu, Faqiang, Mingkun Xu, Guoqi Li, Jing Pei, Luping Shi, and Rong Zhao. "Adversarial symmetric GANs: Bridging adversarial samples and adversarial networks." Neural Networks 133 (January 2021): 148–56. http://dx.doi.org/10.1016/j.neunet.2020.10.016.
Full textHuang, Yang, Yuling Chen, Xuewei Wang, Jing Yang, and Qi Wang. "Promoting Adversarial Transferability via Dual-Sampling Variance Aggregation and Feature Heterogeneity Attacks." Electronics 12, no. 3 (February 3, 2023): 767. http://dx.doi.org/10.3390/electronics12030767.
Full textDing, Yuxin, Miaomiao Shao, Cai Nie, and Kunyang Fu. "An Efficient Method for Generating Adversarial Malware Samples." Electronics 11, no. 1 (January 4, 2022): 154. http://dx.doi.org/10.3390/electronics11010154.
Full textZheng, Tianhang, Changyou Chen, and Kui Ren. "Distributionally Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 2253–60. http://dx.doi.org/10.1609/aaai.v33i01.33012253.
Full textKim, Daeha, and Byung Cheol Song. "Contrastive Adversarial Learning for Person Independent Facial Emotion Recognition." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 7 (May 18, 2021): 5948–56. http://dx.doi.org/10.1609/aaai.v35i7.16743.
Full textBhatia, Siddharth, Arjit Jain, and Bryan Hooi. "ExGAN: Adversarial Generation of Extreme Samples." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 8 (May 18, 2021): 6750–58. http://dx.doi.org/10.1609/aaai.v35i8.16834.
Full textZhang, Pengfei, and Xiaoming Ju. "Adversarial Sample Detection with Gaussian Mixture Conditional Generative Adversarial Networks." Mathematical Problems in Engineering 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/8268249.
Full textLi, Xin, Xiangrui Li, Deng Pan, and Dongxiao Zhu. "Improving Adversarial Robustness via Probabilistically Compact Loss with Logit Constraints." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (May 18, 2021): 8482–90. http://dx.doi.org/10.1609/aaai.v35i10.17030.
Full textWang, Fangwei, Yuanyuan Lu, Changguang Wang, and Qingru Li. "Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection." Wireless Communications and Mobile Computing 2021 (August 30, 2021): 1–9. http://dx.doi.org/10.1155/2021/8736946.
Full textHu, Yongjin, Jin Tian, and Jun Ma. "A Novel Way to Generate Adversarial Network Traffic Samples against Network Traffic Classification." Wireless Communications and Mobile Computing 2021 (August 23, 2021): 1–12. http://dx.doi.org/10.1155/2021/7367107.
Full textPark, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (November 14, 2020): 8079. http://dx.doi.org/10.3390/app10228079.
Full textWang, Kedi, Ping Yi, Futai Zou, and Yue Wu. "Generating Adversarial Samples With Constrained Wasserstein Distance." IEEE Access 7 (2019): 136812–21. http://dx.doi.org/10.1109/access.2019.2942607.
Full textLiu, Xiaolei, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Hao Wang, and Mohsen Guizani. "Adversarial Samples on Android Malware Detection Systems for IoT Systems." Sensors 19, no. 4 (February 25, 2019): 974. http://dx.doi.org/10.3390/s19040974.
Full textRasheed, Bader, Adil Khan, Muhammad Ahmad, Manuel Mazzara, and S. M. Ahsan Kazmi. "Multiple Adversarial Domains Adaptation Approach for Mitigating Adversarial Attacks Effects." International Transactions on Electrical Energy Systems 2022 (October 10, 2022): 1–11. http://dx.doi.org/10.1155/2022/2890761.
Full textGhosh, Partha, Arpan Losalka, and Michael J. Black. "Resisting Adversarial Attacks Using Gaussian Mixture Variational Autoencoders." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 541–48. http://dx.doi.org/10.1609/aaai.v33i01.3301541.
Full textIranmanesh, Seyed Mehdi, and Nasser M. Nasrabadi. "HGAN: Hybrid generative adversarial network." Journal of Intelligent & Fuzzy Systems 40, no. 5 (April 22, 2021): 8927–38. http://dx.doi.org/10.3233/jifs-201202.
Full textHuo, Lin, Huanchao Qi, Simiao Fei, Cong Guan, and Ji Li. "A Generative Adversarial Network Based a Rolling Bearing Data Generation Method Towards Fault Diagnosis." Computational Intelligence and Neuroscience 2022 (July 13, 2022): 1–21. http://dx.doi.org/10.1155/2022/7592258.
Full textHashemi, Atiye Sadat, and Saeed Mozaffari. "CNN adversarial attack mitigation using perturbed samples training." Multimedia Tools and Applications 80, no. 14 (March 23, 2021): 22077–95. http://dx.doi.org/10.1007/s11042-020-10379-6.
Full textLiu, Changrui, Dengpan Ye, Yueyun Shang, Shunzhi Jiang, Shiyu Li, Yuan Mei, and Liqiang Wang. "Defend Against Adversarial Samples by Using Perceptual Hash." Computers, Materials & Continua 62, no. 3 (2020): 1365–86. http://dx.doi.org/10.32604/cmc.2020.07421.
Full textHeo, Byeongho, Minsik Lee, Sangdoo Yun, and Jin Young Choi. "Knowledge Distillation with Adversarial Samples Supporting Decision Boundary." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 3771–78. http://dx.doi.org/10.1609/aaai.v33i01.33013771.
Full textWang, Jinrui, Baokun Han, Huaiqian Bao, Mingyan Wang, Zhenyun Chu, and Yuwei Shen. "Data augment method for machine fault diagnosis using conditional generative adversarial networks." Proceedings of the Institution of Mechanical Engineers, Part D: Journal of Automobile Engineering 234, no. 12 (June 7, 2020): 2719–27. http://dx.doi.org/10.1177/0954407020923258.
Full textWang, Dan, Ming Li, and Yushu Zhang. "Adversarial Data Hiding in Digital Images." Entropy 24, no. 6 (May 25, 2022): 749. http://dx.doi.org/10.3390/e24060749.
Full textWang, Chenyue, Linlin Zhang, Kai Zhao, Xuhui Ding, and Xusheng Wang. "AdvAndMal: Adversarial Training for Android Malware Detection and Family Classification." Symmetry 13, no. 6 (June 17, 2021): 1081. http://dx.doi.org/10.3390/sym13061081.
Full textKang, Ah, Young-Seob Jeong, Se Kim, and Jiyoung Woo. "Malicious PDF Detection Model against Adversarial Attack Built from Benign PDF Containing JavaScript." Applied Sciences 9, no. 22 (November 8, 2019): 4764. http://dx.doi.org/10.3390/app9224764.
Full textWang, Guangxing, and Peng Ren. "Hyperspectral Image Classification with Feature-Oriented Adversarial Active Learning." Remote Sensing 12, no. 23 (November 26, 2020): 3879. http://dx.doi.org/10.3390/rs12233879.
Full textTaheri, Shayan, Milad Salem, and Jiann-Shiun Yuan. "RazorNet: Adversarial Training and Noise Training on a Deep Neural Network Fooled by a Shallow Neural Network." Big Data and Cognitive Computing 3, no. 3 (July 23, 2019): 43. http://dx.doi.org/10.3390/bdcc3030043.
Full textFang, Yong, Cheng Huang, Yijia Xu, and Yang Li. "RLXSS: Optimizing XSS Detection Model to Defend Against Adversarial Attacks Based on Reinforcement Learning." Future Internet 11, no. 8 (August 14, 2019): 177. http://dx.doi.org/10.3390/fi11080177.
Full textLi, Maosen, Yanhua Yang, Kun Wei, Xu Yang, and Heng Huang. "Learning Universal Adversarial Perturbation by Adversarial Example." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 2 (June 28, 2022): 1350–58. http://dx.doi.org/10.1609/aaai.v36i2.20023.
Full textShirazi, Hossein, Bruhadeshwar Bezawada, Indrakshi Ray, and Chuck Anderson. "Directed adversarial sampling attacks on phishing detection." Journal of Computer Security 29, no. 1 (February 3, 2021): 1–23. http://dx.doi.org/10.3233/jcs-191411.
Full textXu, Guangquan, Guofeng Feng, Litao Jiao, Meiqi Feng, Xi Zheng, and Jian Liu. "FNet: A Two-Stream Model for Detecting Adversarial Attacks against 5G-Based Deep Learning Services." Security and Communication Networks 2021 (September 6, 2021): 1–10. http://dx.doi.org/10.1155/2021/5395705.
Full textChhabra, Anshuman, Abhishek Roy, and Prasant Mohapatra. "Suspicion-Free Adversarial Attacks on Clustering Algorithms." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 3625–32. http://dx.doi.org/10.1609/aaai.v34i04.5770.
Full textBartolo, Max, Alastair Roberts, Johannes Welbl, Sebastian Riedel, and Pontus Stenetorp. "Beat the AI: Investigating Adversarial Human Annotation for Reading Comprehension." Transactions of the Association for Computational Linguistics 8 (November 2020): 662–78. http://dx.doi.org/10.1162/tacl_a_00338.
Full textMaldonado-Romo, Javier, Alberto Maldonado-Romo, and Mario Aldape-Pérez. "Path Generator with Unpaired Samples Employing Generative Adversarial Networks." Sensors 22, no. 23 (December 2, 2022): 9411. http://dx.doi.org/10.3390/s22239411.
Full textJiang, Yan, Guisheng Yin, Ye Yuan, and Qingan Da. "Project Gradient Descent Adversarial Attack against Multisource Remote Sensing Image Scene Classification." Security and Communication Networks 2021 (June 12, 2021): 1–13. http://dx.doi.org/10.1155/2021/6663028.
Full textXiang, Fengtao, Jiahui Xu, Wanpeng Zhang, and Weidong Wang. "A Distributed Biased Boundary Attack Method in Black-Box Attack." Applied Sciences 11, no. 21 (November 8, 2021): 10479. http://dx.doi.org/10.3390/app112110479.
Full textAbd Aziz, Nurhakimah, Mohd Azman Hanif Sulaiman, Azlee Zabidi, Ihsan Mohd Yassin, Megat Syahirul Amin Megat Ali, and Zairi Ismael Rizman. "Lightweight Generative Adversarial Network Fundus Image Synthesis." JOIV : International Journal on Informatics Visualization 6, no. 1-2 (May 28, 2022): 270. http://dx.doi.org/10.30630/joiv.6.1-2.924.
Full textDemetrio, Luca, Scott E. Coull, Battista Biggio, Giovanni Lagorio, Alessandro Armando, and Fabio Roli. "Adversarial EXEmples." ACM Transactions on Privacy and Security 24, no. 4 (November 30, 2021): 1–31. http://dx.doi.org/10.1145/3473039.
Full textSantana, Everton Jose, Ricardo Petri Silva, Bruno Bogaz Zarpelão, and Sylvio Barbon Junior. "Detecting and Mitigating Adversarial Examples in Regression Tasks: A Photovoltaic Power Generation Forecasting Case Study." Information 12, no. 10 (September 26, 2021): 394. http://dx.doi.org/10.3390/info12100394.
Full textMan, Junfeng, Minglei Zheng, Yi Liu, Yiping Shen, and Qianqian Li. "Bearing Remaining Useful Life Prediction Based on AdCNN and CWGAN under Few Samples." Shock and Vibration 2022 (June 30, 2022): 1–17. http://dx.doi.org/10.1155/2022/1709071.
Full textSingla, Yaman Kumar, Swapnil Parekh, Somesh Singh, Changyou Chen, Balaji Krishnamurthy, and Rajiv Ratn Shah. "MINIMAL: Mining Models for Universal Adversarial Triggers." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 10 (June 28, 2022): 11330–39. http://dx.doi.org/10.1609/aaai.v36i10.21384.
Full textWei, Zhipeng, Jingjing Chen, Micah Goldblum, Zuxuan Wu, Tom Goldstein, and Yu-Gang Jiang. "Towards Transferable Adversarial Attacks on Vision Transformers." Proceedings of the AAAI Conference on Artificial Intelligence 36, no. 3 (June 28, 2022): 2668–76. http://dx.doi.org/10.1609/aaai.v36i3.20169.
Full textCai, Zhipeng, Zuobin Xiong, Honghui Xu, Peng Wang, Wei Li, and Yi Pan. "Generative Adversarial Networks." ACM Computing Surveys 54, no. 6 (July 2021): 1–38. http://dx.doi.org/10.1145/3459992.
Full textHennessy, Andrew, Kenneth Clarke, and Megan Lewis. "Generative Adversarial Network Synthesis of Hyperspectral Vegetation Data." Remote Sensing 13, no. 12 (June 8, 2021): 2243. http://dx.doi.org/10.3390/rs13122243.
Full textKwon, Hyun, and Jun Lee. "Diversity Adversarial Training against Adversarial Attack on Deep Neural Networks." Symmetry 13, no. 3 (March 6, 2021): 428. http://dx.doi.org/10.3390/sym13030428.
Full textQureshi, Ayyaz Ul Haq, Hadi Larijani, Mehdi Yousefi, Ahsan Adeel, and Nhamoinesu Mtetwa. "An Adversarial Approach for Intrusion Detection Systems Using Jacobian Saliency Map Attacks (JSMA) Algorithm." Computers 9, no. 3 (July 20, 2020): 58. http://dx.doi.org/10.3390/computers9030058.
Full textLuo, Zhirui, Qingqing Li, and Jun Zheng. "A Study of Adversarial Attacks and Detection on Deep Learning-Based Plant Disease Identification." Applied Sciences 11, no. 4 (February 20, 2021): 1878. http://dx.doi.org/10.3390/app11041878.
Full textGu, Peng, Chengfei Zhu, Xiaosong Lan, Jie Wang, and Shuxiao Li. "Robust Image Classification with Cognitive-Driven Color Priors." Electronics 9, no. 11 (November 3, 2020): 1837. http://dx.doi.org/10.3390/electronics9111837.
Full textHashemi, Seyed Mohammad, Ruxandra Mihaela Botez, and Teodor Lucian Grigorie. "New Reliability Studies of Data-Driven Aircraft Trajectory Prediction." Aerospace 7, no. 10 (October 9, 2020): 145. http://dx.doi.org/10.3390/aerospace7100145.
Full textLiu, Xiaolei, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, and Xiaojiang Du. "TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems." Sensors 18, no. 8 (August 10, 2018): 2630. http://dx.doi.org/10.3390/s18082630.
Full textHarford, Samuel, Fazle Karim, and Houshang Darabi. "Generating Adversarial Samples on Multivariate Time Series using Variational Autoencoders." IEEE/CAA Journal of Automatica Sinica 8, no. 9 (September 2021): 1523–38. http://dx.doi.org/10.1109/jas.2021.1004108.
Full text