• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4697236)   Today's Articles (208)
For: Rota Bulo S, Biggio B, Pillai I, Pelillo M, Roli F. Randomized Prediction Games for Adversarial Machine Learning. IEEE Trans Neural Netw Learn Syst 2017;28:2466-2478. [PMID: 27514067 DOI: 10.1109/tnnls.2016.2593488] [Citation(s) in RCA: 7] [Impact Index Per Article: 0.9] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/06/2023]
Number Cited by Other Article(s)
1
Franci B, Grammatico S. Training Generative Adversarial Networks via Stochastic Nash Games. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023;34:1319-1328. [PMID: 34437077 DOI: 10.1109/tnnls.2021.3105227] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
2
A review of spam email detection: analysis of spammer strategies and the dataset shift problem. Artif Intell Rev 2022. [DOI: 10.1007/s10462-022-10195-4] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
3
FADER: Fast adversarial example rejection. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2021.10.082] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
4
Wang D, Zhu X, Pedrycz W, Li Z. A randomization mechanism for realizing granular models in distributed system modeling. Knowl Based Syst 2021. [DOI: 10.1016/j.knosys.2021.107376] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
5
Sethi K, Madhav YV, Kumar R, Bera P. Attention based multi-agent intrusion detection systems using reinforcement learning. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2021. [DOI: 10.1016/j.jisa.2021.102923] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
6
Sadeghi K, Banerjee A, Gupta SKS. A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning. IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTATIONAL INTELLIGENCE 2021;4:450-467. [PMID: 33748635 DOI: 10.1109/tetci.2020.2968933] [Citation(s) in RCA: 18] [Impact Index Per Article: 4.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
7
Zhang J, Li C. Adversarial Examples: Opportunities and Challenges. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2020;31:2578-2593. [PMID: 31722487 DOI: 10.1109/tnnls.2019.2933524] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
8
Tan S, Wang Y. Graphical Nash Equilibria and Replicator Dynamics on Complex Networks. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2020;31:1831-1842. [PMID: 31398132 DOI: 10.1109/tnnls.2019.2927233] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
9
Sotgiu A, Demontis A, Melis M, Biggio B, Fumera G, Feng X, Roli F. Deep neural rejection against adversarial examples. EURASIP JOURNAL ON INFORMATION SECURITY 2020. [DOI: 10.1186/s13635-020-00105-y] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/10/2022]  Open
10
Defacement Detection with Passive Adversaries. ALGORITHMS 2019. [DOI: 10.3390/a12080150] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
11
Mohaghegh Neyshabouri M, Gokcesu K, Gokcesu H, Ozkan H, Kozat SS. Asymptotically Optimal Contextual Bandit Algorithm Using Hierarchical Structures. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2019;30:923-937. [PMID: 30072350 DOI: 10.1109/tnnls.2018.2854796] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
12
Zhang R, Zhu Q. A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2018;29:5512-5527. [PMID: 29993612 DOI: 10.1109/tnnls.2018.2802721] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA