Author:
Demertzis Konstantinos,Iliadis Lazaros,Kikiras Panagiotis
Publisher
Springer International Publishing
Reference26 articles.
1. Understanding Machine Learning, Pattern recognition and machine learning. Cambridge University Press. https://www.cambridge.org/il/academic/subjects/computer-science/pattern-recognition-and-machine-learning/understanding-machine-learning-theory-algorithms. Accessed 16 Feb 2021
2. Tygar, J.D.: Adversarial machine learning. IEEE Internet Comput. 15(5), 4–6 (2011). https://doi.org/10.1109/MIC.2011.112
3. Zhu, Z., Lu, Y., Chiang, C.: Generating adversarial examples by makeup attacks on face recognition. In: 2019 IEEE International Conference on Image Processing (ICIP), pp. 2516–2520 (2019). https://doi.org/10.1109/ICIP.2019.8803269
4. Guo, H., Peng, L., Zhang, J., Qi, F., Duan, L.: Fooling AI with AI: an accelerator for adversarial attacks on deep learning visual classification. In: 2019 IEEE 30th International Conference on Application-specific Systems, Architectures and Processors (ASAP), vol. 2160–052X, pp. 136–136 (2019). https://doi.org/10.1109/ASAP.2019.00-16
5. Demertzis, K., Tziritas, N., Kikiras, P., Sanchez, S.L., Iliadis, L.: The next generation cognitive security operations center: adaptive analytic lambda architecture for efficient defense against adversarial attacks. Big Data Cogn. Comput. 3(1), 6 (2019). https://doi.org/10.3390/bdcc3010006
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献