Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference211 articles.
1. Abbasi M, Gagné C (2019) Robustness to adversarial examples through an ensemble of specialists, in 5th International Conference on Learning Representations, ICLR 2017 - Workshop Track Proceedings, pp. 1–9
2. Ahmad S, Mehfuz S, Mebarek-Oudina F, Beg J (2022) RSM analysis based cloud access security broker: a systematic literature review. Clust Comput 25(5):3733–3763. https://doi.org/10.1007/s10586-022-03598-z
3. Ahmadi MA, Dianat R, Amirkhani H (2021) An adversarial attack detection method in deep neural networks based on re-attacking approach. Multimed Tools Appl 80(7). https://doi.org/10.1007/s11042-020-10261-5
4. Akhtar N, Liu J, Mian A (2018) Defense against universal adversarial perturbations. Proceedings of the IEEE Computer Society Conference on Computer Vision and Pattern Recognition 2017:3389–3398
5. Akhtar N, Mian A, Kardan N, Shah M (2021) Advances in Adversarial Attacks and Defenses in Computer Vision: A Survey. IEEE Access, vol. 9. Institute of Electrical and Electronics Engineers Inc., pp. 155161–155196. https://doi.org/10.1109/ACCESS.2021.3127960
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献