Author:
Shah Milind,Gandhi Kinjal,Joshi Seema,Nagar Mudita Dave,Patel Ved,Patel Yash
Publisher
Springer Nature Switzerland
Reference26 articles.
1. Kurakin, A., et al.: Adversarial attacks and defenses competition, pp. 195–231 (2018). https://doi.org/10.1007/978-3-319-94042-7_11
2. Qin, Y., Frosst, N., Raffel, C., Cottrell, G., Hinton, G.: Deflecting Adversarial Attacks, no. ICML (2020). http://arxiv.org/abs/2002.07405
3. Liu, N., Du, M., Guo, R., Liu, H., Hu, X.: Adversarial attacks and defenses: an interpretation perspective (2020). http://arxiv.org/abs/2004.11488
4. Marchisio, A., Nanfa, G., Khalid, F., Hanif, M.A., Martina, M., Shafique, M.: SeVuc: a study on the security vulnerabilities of capsule networks against adversarial attacks. Microprocess. Microsyst. 96, 104738 (2023). https://doi.org/10.1016/j.micpro.2022.104738
5. Osuala, R., et al.: Data synthesis and adversarial networks: a review and meta-analysis in cancer imaging. Med. Image Anal. 84, 102704 (2023). https://doi.org/10.1016/j.media.2022.102704