• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4698277)   Today's Articles (226)
For: Zhang J, Li C. Adversarial Examples: Opportunities and Challenges. IEEE Trans Neural Netw Learn Syst 2020;31:2578-2593. [PMID: 31722487 DOI: 10.1109/tnnls.2019.2933524] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.2] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Number Cited by Other Article(s)
1
Bortolussi L, Carbone G, Laurenti L, Patane A, Sanguinetti G, Wicker M. On the Robustness of Bayesian Neural Networks to Adversarial Attacks. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2025;36:6679-6692. [PMID: 38648123 DOI: 10.1109/tnnls.2024.3386642] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 04/25/2024]
2
Yu C, Chen J, Wang Y, Xue Y, Ma H. Improving Adversarial Robustness Against Universal Patch Attacks Through Feature Norm Suppressing. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2025;36:1410-1424. [PMID: 37917525 DOI: 10.1109/tnnls.2023.3326871] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/04/2023]
3
Liu H, Ge Z, Zhou Z, Shang F, Liu Y, Jiao L. Gradient Correction for White-Box Adversarial Attacks. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024;35:18419-18430. [PMID: 37819820 DOI: 10.1109/tnnls.2023.3315414] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/13/2023]
4
Rossolini G, Nesti F, D'Amico G, Nair S, Biondi A, Buttazzo G. On the Real-World Adversarial Robustness of Real-Time Semantic Segmentation Models for Autonomous Driving. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024;35:18328-18342. [PMID: 37782588 DOI: 10.1109/tnnls.2023.3314512] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/04/2023]
5
Qi B, Zhou B, Zhang W, Liu J, Wu L. Improving Robustness of Intent Detection Under Adversarial Attacks: A Geometric Constraint Perspective. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024;35:6133-6144. [PMID: 37566500 DOI: 10.1109/tnnls.2023.3267460] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 08/13/2023]
6
Liu F, Tian J, Miranda-Moreno L, Sun L. Adversarial Danger Identification on Temporally Dynamic Graphs. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2024;35:4744-4755. [PMID: 37028290 DOI: 10.1109/tnnls.2023.3252175] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/19/2023]
7
McCarthy A, Ghadafi E, Andriotis P, Legg P. Defending against adversarial machine learning attacks using hierarchical learning: A case study on network traffic attack classification. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2023. [DOI: 10.1016/j.jisa.2022.103398] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 12/23/2022]
8
CAMA: Class activation mapping disruptive attack for deep neural networks. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.05.065] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
9
Li X, Jiang Y, Liu C, Liu S, Luo H, Yin S. Playing Against Deep-Neural-Network-Based Object Detectors: A Novel Bidirectional Adversarial Attack Approach. IEEE TRANSACTIONS ON ARTIFICIAL INTELLIGENCE 2022;3:20-28. [DOI: 10.1109/tai.2021.3107807] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 09/03/2024]
10
A Survey on Data-Driven Learning for Intelligent Network Intrusion Detection Systems. ELECTRONICS 2022. [DOI: 10.3390/electronics11020213] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
11
Robustness to adversarial examples can be improved with overfitting. INT J MACH LEARN CYB 2020. [DOI: 10.1007/s13042-020-01097-4] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
12
Liu X, Lin Y, Li H, Zhang J. A novel method for malware detection on ML-based visualization technique. Comput Secur 2020. [DOI: 10.1016/j.cose.2019.101682] [Citation(s) in RCA: 25] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
PrevPage 1 of 1 1Next
© 2004-2025 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA