• Reference Citation Analysis
  • v
  • v
  • Find an Article
  • Find an Author
Download
Number Citation Analysis
1
Alkadi S, Al-Ahmadi S, Ben Ismail MM. RobEns: Robust Ensemble Adversarial Machine Learning Framework for Securing IoT Traffic. Sensors (Basel) 2024;24:2626. [PMID: 38676241 PMCID: PMC11053586 DOI: 10.3390/s24082626] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Subscribe] [Scholar Register] [Received: 03/01/2024] [Revised: 03/29/2024] [Accepted: 04/10/2024] [Indexed: 04/28/2024]
2
Alkhowaiter M, Kholidy H, Alyami MA, Alghamdi A, Zou C. Adversarial-Aware Deep Learning System Based on a Secondary Classical Machine Learning Verification Approach. Sensors (Basel) 2023;23:6287. [PMID: 37514582 PMCID: PMC10384939 DOI: 10.3390/s23146287] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 05/31/2023] [Revised: 07/06/2023] [Accepted: 07/08/2023] [Indexed: 07/30/2023]
3
Lucieri A, Dengel A, Ahmed S. Translating theory into practice: assessing the privacy implications of concept-based explanations for biomedical AI. Front Bioinform 2023;3:1194993. [PMID: 37484865 PMCID: PMC10356902 DOI: 10.3389/fbinf.2023.1194993] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/27/2023] [Accepted: 06/20/2023] [Indexed: 07/25/2023]  Open
4
Shao K, Yang J, Hu P, Li X. A Textual Backdoor Defense Method Based on Deep Feature Classification. Entropy (Basel) 2023;25:220. [PMID: 36832587 PMCID: PMC9955932 DOI: 10.3390/e25020220] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 11/29/2022] [Revised: 01/12/2023] [Accepted: 01/16/2023] [Indexed: 06/18/2023]
5
Rohanian O, Kouchaki S, Soltan A, Yang J, Rohanian M, Yang Y, Clifton D. Privacy-Aware Early Detection of COVID-19 Through Adversarial Training. IEEE J Biomed Health Inform 2022;PP:1249-1258. [PMID: 37015447 PMCID: PMC10824398 DOI: 10.1109/jbhi.2022.3230663] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Grants] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 03/04/2022] [Revised: 11/25/2022] [Accepted: 12/12/2022] [Indexed: 12/24/2022]
6
Zong W, Chow YW, Susilo W, Kim J, Le NT. Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. J Imaging 2022;8. [PMID: 36547489 DOI: 10.3390/jimaging8120324] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 11/02/2022] [Revised: 12/03/2022] [Accepted: 12/06/2022] [Indexed: 12/14/2022]  Open
7
Benaddi H, Jouhari M, Ibrahimi K, Ben Othman J, Amhoud EM. Anomaly Detection in Industrial IoT Using Distributional Reinforcement Learning and Generative Adversarial Networks. Sensors (Basel) 2022;22:8085. [PMID: 36365782 PMCID: PMC9656136 DOI: 10.3390/s22218085] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 10/01/2022] [Revised: 10/12/2022] [Accepted: 10/19/2022] [Indexed: 06/16/2023]
8
Anastasiou T, Karagiorgou S, Petrou P, Papamartzivanos D, Giannetsos T, Tsirigotaki G, Keizer J. Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems. Sensors (Basel) 2022;22:6905. [PMID: 36146258 PMCID: PMC9506202 DOI: 10.3390/s22186905] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 08/26/2022] [Revised: 09/07/2022] [Accepted: 09/08/2022] [Indexed: 06/16/2023]
9
Baia AE, Biondi G, Franzoni V, Milani A, Poggioni V. Lie to Me: Shield Your Emotions from Prying Software. Sensors (Basel) 2022;22:s22030967. [PMID: 35161713 PMCID: PMC8840139 DOI: 10.3390/s22030967] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 01/01/2022] [Revised: 01/22/2022] [Accepted: 01/22/2022] [Indexed: 01/27/2023]
10
Mahmood K, Gurevin D, van Dijk M, Nguyen PH. Beware the Black-Box: On the Robustness of Recent Defenses to Adversarial Examples. Entropy (Basel) 2021;23:e23101359. [PMID: 34682083 PMCID: PMC8534430 DOI: 10.3390/e23101359] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 09/16/2021] [Revised: 10/14/2021] [Accepted: 10/14/2021] [Indexed: 11/27/2022]
11
Menéndez HD, Clark D, T Barr E. Getting Ahead of the Arms Race: Hothousing the Coevolution of VirusTotal with a Packer. Entropy (Basel) 2021;23:395. [PMID: 33810471 DOI: 10.3390/e23040395] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/28/2021] [Revised: 03/19/2021] [Accepted: 03/23/2021] [Indexed: 11/26/2022]
12
Sadeghi K, Banerjee A, Gupta SKS. A System-Driven Taxonomy of Attacks and Defenses in Adversarial Machine Learning. IEEE Trans Emerg Top Comput Intell 2021;4:450-467. [PMID: 33748635 DOI: 10.1109/tetci.2020.2968933] [Citation(s) in RCA: 18] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/08/2022]
13
Maestre Vidal J, Sotelo Monge MA. Obfuscation of Malicious Behaviors for Thwarting Masquerade Detection Systems Based on Locality Features. Sensors (Basel) 2020;20:s20072084. [PMID: 32272806 PMCID: PMC7181010 DOI: 10.3390/s20072084] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [What about the content of this article? (0)] [Affiliation(s)] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 03/04/2020] [Revised: 03/30/2020] [Accepted: 04/03/2020] [Indexed: 11/16/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA