Journal articles on the topic 'Adversarial Testing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adversarial Testing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Lindley, Dennis V., and Nozer D. Singpurwalla. "Adversarial Life Testing." Journal of the Royal Statistical Society: Series B (Methodological) 55, no. 4 (September 1993): 837–47. http://dx.doi.org/10.1111/j.2517-6161.1993.tb01944.x.
Full textRufo, M. J., J. Martín, and C. J. Pérez. "Adversarial life testing: A Bayesian negotiation model." Reliability Engineering & System Safety 131 (November 2014): 118–25. http://dx.doi.org/10.1016/j.ress.2014.06.007.
Full textDürr, Christoph, Thomas Erlebach, Nicole Megow, and Julie Meißner. "An Adversarial Model for Scheduling with Testing." Algorithmica 82, no. 12 (July 10, 2020): 3630–75. http://dx.doi.org/10.1007/s00453-020-00742-2.
Full textEdmond, Gary. "Forensic science and the myth of adversarial testing." Current Issues in Criminal Justice 32, no. 2 (December 1, 2019): 146–79. http://dx.doi.org/10.1080/10345329.2019.1689786.
Full textHoque, Endadul, Hyojeong Lee, Rahul Potharaju, Charles Killian, and Cristina Nita-Rotaru. "Automated Adversarial Testing of Unmodified Wireless Routing Implementations." IEEE/ACM Transactions on Networking 24, no. 6 (December 2016): 3369–82. http://dx.doi.org/10.1109/tnet.2016.2520474.
Full textLiu, Xiaolei, Xiaosong Zhang, Nadra Guizani, Jiazhong Lu, Qingxin Zhu, and Xiaojiang Du. "TLTD: A Testing Framework for Learning-Based IoT Traffic Detection Systems." Sensors 18, no. 8 (August 10, 2018): 2630. http://dx.doi.org/10.3390/s18082630.
Full textCHAN-HON-TONG, Adrien. "An Algorithm for Generating Invisible Data Poisoning Using Adversarial Noise That Breaks Image Classification Deep Learning." Machine Learning and Knowledge Extraction 1, no. 1 (November 9, 2018): 192–204. http://dx.doi.org/10.3390/make1010011.
Full textLiu, Xiaolei, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Hao Wang, and Mohsen Guizani. "Adversarial Samples on Android Malware Detection Systems for IoT Systems." Sensors 19, no. 4 (February 25, 2019): 974. http://dx.doi.org/10.3390/s19040974.
Full textZhang, Pengfei, and Xiaoming Ju. "Adversarial Sample Detection with Gaussian Mixture Conditional Generative Adversarial Networks." Mathematical Problems in Engineering 2021 (September 13, 2021): 1–18. http://dx.doi.org/10.1155/2021/8268249.
Full textBateman, Ian, Daniel Kahneman, Alistair Munro, Chris Starmer, and Robert Sugden. "Testing competing models of loss aversion: an adversarial collaboration." Journal of Public Economics 89, no. 8 (August 2005): 1561–80. http://dx.doi.org/10.1016/j.jpubeco.2004.06.013.
Full textQiu, Shilin, Qihe Liu, Shijie Zhou, and Chunjiang Wu. "Review of Artificial Intelligence Adversarial Attack and Defense Technologies." Applied Sciences 9, no. 5 (March 4, 2019): 909. http://dx.doi.org/10.3390/app9050909.
Full textShu, Michelle, Chenxi Liu, Weichao Qiu, and Alan Yuille. "Identifying Model Weakness with Adversarial Examiner." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 11998–2006. http://dx.doi.org/10.1609/aaai.v34i07.6876.
Full textFeng, Yan, Bin Chen, Tao Dai, and Shu-Tao Xia. "Adversarial Attack on Deep Product Quantization Network for Image Retrieval." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 10786–93. http://dx.doi.org/10.1609/aaai.v34i07.6708.
Full textSwamidurai, Rajendran, and David A. Umphress. "Collaborative-Adversarial Pair Programming." ISRN Software Engineering 2012 (August 21, 2012): 1–11. http://dx.doi.org/10.5402/2012/516184.
Full textChamberlain, R. T. "Legal issues related to drug testing in the clinical laboratory." Clinical Chemistry 34, no. 3 (March 1, 1988): 633–36. http://dx.doi.org/10.1093/clinchem/34.3.633.
Full textNazário Coelho, Vitor, Rodolfo Pereira Araújo, Haroldo Gambini Santos, Wang Yong Qiang, and Igor Machado Coelho. "A MILP Model for a Byzantine Fault Tolerant Blockchain Consensus." Future Internet 12, no. 11 (October 29, 2020): 185. http://dx.doi.org/10.3390/fi12110185.
Full textMa, Qianli, Wanqing Zhuang, Sen Li, Desen Huang, and Garrison Cottrell. "Adversarial Dynamic Shapelet Networks." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 04 (April 3, 2020): 5069–76. http://dx.doi.org/10.1609/aaai.v34i04.5948.
Full textChristodoulou, Klitos, Elias Iosif, Antonios Inglezakis, and Marinos Themistocleous. "Consensus Crash Testing: Exploring Ripple’s Decentralization Degree in Adversarial Environments." Future Internet 12, no. 3 (March 16, 2020): 53. http://dx.doi.org/10.3390/fi12030053.
Full textBock, Joel R., and Akhilesh Maewal. "Adversarial Learning for Product Recommendation." AI 1, no. 3 (September 1, 2020): 376–88. http://dx.doi.org/10.3390/ai1030025.
Full textBrandao, Fernando G. S. L., Aram W. Harrow, James R. Lee, and Yuval Peres. "Adversarial Hypothesis Testing and a Quantum Stein’s Lemma for Restricted Measurements." IEEE Transactions on Information Theory 66, no. 8 (August 2020): 5037–54. http://dx.doi.org/10.1109/tit.2020.2979704.
Full textWang, Jinrui, Shanshan Ji, Baokun Han, Huaiqian Bao, and Xingxing Jiang. "Deep Adaptive Adversarial Network-Based Method for Mechanical Fault Diagnosis under Different Working Conditions." Complexity 2020 (July 23, 2020): 1–11. http://dx.doi.org/10.1155/2020/6946702.
Full textHanji, Param, Muhammad Z. Alam, Nicola Giuliani, Hu Chen, and Rafał K. Mantiuk. "HDR4CV: High Dynamic Range Dataset with Adversarial Illumination for Testing Computer Vision Methods." Journal of Imaging Science and Technology 65, no. 4 (July 1, 2021): 40404–1. http://dx.doi.org/10.2352/j.imagingsci.technol.2021.65.4.040404.
Full textCourtenay, Lloyd A., and Diego González-Aguilera. "Geometric Morphometric Data Augmentation Using Generative Computational Learning Algorithms." Applied Sciences 10, no. 24 (December 21, 2020): 9133. http://dx.doi.org/10.3390/app10249133.
Full textCohen, P. L., M. A. Olson, and C. B. Fogarty. "Multivariate one-sided testing in matched observational studies as an adversarial game." Biometrika 107, no. 4 (June 3, 2020): 809–25. http://dx.doi.org/10.1093/biomet/asaa024.
Full textZhang, Guokai, Haoping Xiao, Jingwen Jiang, Qinyuan Liu, Yimo Liu, and Liying Wang. "A Multi-Index Generative Adversarial Network for Tool Wear Detection with Imbalanced Data." Complexity 2020 (December 5, 2020): 1–10. http://dx.doi.org/10.1155/2020/5831632.
Full textSpooner, James, Vasile Palade, Madeline Cheah, Stratis Kanarachos, and Alireza Daneshkhah. "Generation of Pedestrian Crossing Scenarios Using Ped-Cross Generative Adversarial Network." Applied Sciences 11, no. 2 (January 6, 2021): 471. http://dx.doi.org/10.3390/app11020471.
Full textPan, Boxiao, Zhangjie Cao, Ehsan Adeli, and Juan Carlos Niebles. "Adversarial Cross-Domain Action Recognition with Co-Attention." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 11815–22. http://dx.doi.org/10.1609/aaai.v34i07.6854.
Full textPievatolo, Antonio, Fabrizio Ruggeri, Refik Soyer, and Simon Wilson. "Decisions in Risk and Reliability: An Explanatory Perspective." Stats 4, no. 2 (March 26, 2021): 228–50. http://dx.doi.org/10.3390/stats4020017.
Full textZunino, Andrea, Jacopo Cavazza, Riccardo Volpi, Pietro Morerio, Andrea Cavallo, Cristina Becchio, and Vittorio Murino. "Predicting Intentions from Motion: The Subject-Adversarial Adaptation Approach." International Journal of Computer Vision 128, no. 1 (September 18, 2019): 220–39. http://dx.doi.org/10.1007/s11263-019-01234-9.
Full textXu, Xing, Jialin Tian, Kaiyi Lin, Huimin Lu, Jie Shao, and Heng Tao Shen. "Zero-shot Cross-modal Retrieval by Assembling AutoEncoder and Generative Adversarial Network." ACM Transactions on Multimedia Computing, Communications, and Applications 17, no. 1s (March 31, 2021): 1–17. http://dx.doi.org/10.1145/3424341.
Full textHomoliak, Ivan, Kamil Malinka, and Petr Hanacek. "ASNM Datasets: A Collection of Network Attacks for Testing of Adversarial Classifiers and Intrusion Detectors." IEEE Access 8 (2020): 112427–53. http://dx.doi.org/10.1109/access.2020.3001768.
Full textRahnemoonfar, Maryam, Jimmy Johnson, and John Paden. "AI Radar Sensor: Creating Radar Depth Sounder Images Based on Generative Adversarial Network." Sensors 19, no. 24 (December 12, 2019): 5479. http://dx.doi.org/10.3390/s19245479.
Full textCaramihale, Traian, Dan Popescu, and Loretta Ichim. "Emotion Classification Using a Tensorflow Generative Adversarial Network Implementation." Symmetry 10, no. 9 (September 19, 2018): 414. http://dx.doi.org/10.3390/sym10090414.
Full textZhou, Xingyu, Zhisong Pan, Guyu Hu, Siqi Tang, and Cheng Zhao. "Stock Market Prediction on High-Frequency Data Using Generative Adversarial Nets." Mathematical Problems in Engineering 2018 (2018): 1–11. http://dx.doi.org/10.1155/2018/4907423.
Full textMa, Rui-Qiang, Xing-Run Shen, and Shan-Jun Zhang. "Single Image Defogging Algorithm Based on Conditional Generative Adversarial Network." Mathematical Problems in Engineering 2020 (November 24, 2020): 1–8. http://dx.doi.org/10.1155/2020/7938060.
Full textPutin, E. O., and A. A. Shalyto. "Adversarial Threshold Neural Computer for Small Organic Molecular Structures." Information and Control Systems, no. 4 (September 23, 2018): 52–60. http://dx.doi.org/10.31799/1684-8853-2018-4-52-60.
Full textWang, Xiaodong, and Feng Liu. "Triplet Loss Guided Adversarial Domain Adaptation for Bearing Fault Diagnosis." Sensors 20, no. 1 (January 6, 2020): 320. http://dx.doi.org/10.3390/s20010320.
Full textSharifi-Noghabi, Hossein, Shuman Peng, Olga Zolotareva, Colin C. Collins, and Martin Ester. "AITL: Adversarial Inductive Transfer Learning with input and output space adaptation for pharmacogenomics." Bioinformatics 36, Supplement_1 (July 1, 2020): i380—i388. http://dx.doi.org/10.1093/bioinformatics/btaa442.
Full textSuryanto, Naufal, Hyoeun Kang, Yongsu Kim, Youngyeo Yun, Harashta Tatimma Larasati, and Howon Kim. "A Distributed Black-Box Adversarial Attack Based on Multi-Group Particle Swarm Optimization." Sensors 20, no. 24 (December 14, 2020): 7158. http://dx.doi.org/10.3390/s20247158.
Full textNie, Yixin, Yicheng Wang, and Mohit Bansal. "Analyzing Compositionality-Sensitivity of NLI Models." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 6867–74. http://dx.doi.org/10.1609/aaai.v33i01.33016867.
Full textEllis, Desmond. "Marital Separation and Lethal Male Partner Violence." Violence Against Women 23, no. 4 (July 9, 2016): 503–19. http://dx.doi.org/10.1177/1077801216644985.
Full textNoh, Kyoung Jun, Jiho Choi, Jin Seong Hong, and Kang Ryoung Park. "Finger-Vein Recognition Using Heterogeneous Databases by Domain Adaption Based on a Cycle-Consistent Adversarial Network." Sensors 21, no. 2 (January 13, 2021): 524. http://dx.doi.org/10.3390/s21020524.
Full textIbrahim, Yahya, Balázs Nagy, and Csaba Benedek. "Deep Learning-Based Masonry Wall Image Analysis." Remote Sensing 12, no. 23 (November 29, 2020): 3918. http://dx.doi.org/10.3390/rs12233918.
Full textKim, Bubryur, N. Yuvaraj, K. R. Sri Preethaa, Gang Hu, and Dong-Eun Lee. "Wind-Induced Pressure Prediction on Tall Buildings Using Generative Adversarial Imputation Network." Sensors 21, no. 7 (April 3, 2021): 2515. http://dx.doi.org/10.3390/s21072515.
Full textWang, Xiaodong, Feng Liu, and Dongdong Zhao. "Cross-Machine Fault Diagnosis with Semi-Supervised Discriminative Adversarial Domain Adaptation." Sensors 20, no. 13 (July 4, 2020): 3753. http://dx.doi.org/10.3390/s20133753.
Full textHuang, Xiaowei, Daniel Kroening, Wenjie Ruan, James Sharp, Youcheng Sun, Emese Thamo, Min Wu, and Xinping Yi. "A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability." Computer Science Review 37 (August 2020): 100270. http://dx.doi.org/10.1016/j.cosrev.2020.100270.
Full textHamid, Nor’Adha Bt Abdul, Mohamad Hafifi Hassim, and Tuan Nurhafiza Raja Abdul Aziz. "Non-Adversarial Dispute Resolutions: Studying Of Japanese Non-Litigious Country And Society." Advances in Social Sciences Research Journal 7, no. 8 (August 17, 2020): 188–201. http://dx.doi.org/10.14738/assrj.78.8779.
Full textHusein, Amir Mahmud, Muhammad Arsyal, Sutrisno Sinaga, and Hendra Syahputa. "Generative Adversarial Networks Time Series Models to Forecast Medicine Daily Sales in Hospital." SinkrOn 3, no. 2 (March 13, 2019): 112. http://dx.doi.org/10.33395/sinkron.v3i2.10044.
Full textHu, Guanghua, Junfeng Huang, Qinghui Wang, Jingrong Li, Zhijia Xu, and Xingbiao Huang. "Unsupervised fabric defect detection based on a deep convolutional generative adversarial network." Textile Research Journal 90, no. 3-4 (July 17, 2019): 247–70. http://dx.doi.org/10.1177/0040517519862880.
Full textZhang, Xihui, Jasbir S. Dhaliwal, Mark L. Gillenson, and Thomas F. Stafford. "The Impact of Conflict Judgments between Developers and Testers in Software Development." Journal of Database Management 24, no. 4 (October 2013): 26–50. http://dx.doi.org/10.4018/jdm.2013100102.
Full text