Journal articles on the topic 'Adversarial Channels'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Adversarial Channels.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Suresh, Vinayak, Eric Ruzomberka, Chih-Chun Wang, and David J. Love. "Causal Adversarial Channels With Feedback Snooping." IEEE Journal on Selected Areas in Information Theory 3, no. 1 (March 2022): 69–84. http://dx.doi.org/10.1109/jsait.2022.3158230.
Full textWang, Pengwei, and Reihaneh Safavi-Naini. "A Model for Adversarial Wiretap Channels." IEEE Transactions on Information Theory 62, no. 2 (February 2016): 970–83. http://dx.doi.org/10.1109/tit.2015.2503766.
Full textSimon, Paul, Scott Graham, Christopher Talbot, and Micah Hayden. "Model for Quantifying the Quality of Secure Service." Journal of Cybersecurity and Privacy 1, no. 2 (May 7, 2021): 289–301. http://dx.doi.org/10.3390/jcp1020016.
Full textAnantharamu, Lakshmi, Bogdan S. Chlebus, and Mariusz A. Rokicki. "Adversarial Multiple Access Channels with Individual Injection Rates." Theory of Computing Systems 61, no. 3 (November 28, 2016): 820–50. http://dx.doi.org/10.1007/s00224-016-9725-x.
Full textPan, Xuran, Fan Yang, Lianru Gao, Zhengchao Chen, Bing Zhang, Hairui Fan, and Jinchang Ren. "Building Extraction from High-Resolution Aerial Imagery Using a Generative Adversarial Network with Spatial and Channel Attention Mechanisms." Remote Sensing 11, no. 8 (April 15, 2019): 917. http://dx.doi.org/10.3390/rs11080917.
Full textSafavi-Naini, Reihaneh, and Pengwei Wang. "A Model for Adversarial Wiretap Channels and its Applications." Journal of Information Processing 23, no. 5 (2015): 554–61. http://dx.doi.org/10.2197/ipsjjip.23.554.
Full textLeung, Debbie, and Graeme Smith. "Communicating Over Adversarial Quantum Channels Using Quantum List Codes." IEEE Transactions on Information Theory 54, no. 2 (February 2008): 883–87. http://dx.doi.org/10.1109/tit.2007.913433.
Full textChlebus, Bogdan S., Dariusz R. Kowalski, and Mariusz A. Rokicki. "Maximum throughput of multiple access channels in adversarial environments." Distributed Computing 22, no. 2 (August 27, 2009): 93–116. http://dx.doi.org/10.1007/s00446-009-0086-4.
Full textSutanto, Richard Evan, and Sukho Lee. "Real-Time Adversarial Attack Detection with Deep Image Prior Initialized as a High-Level Representation Based Blurring Network." Electronics 10, no. 1 (December 30, 2020): 52. http://dx.doi.org/10.3390/electronics10010052.
Full textAhlswede, Rudolf, Igor Bjelaković, Holger Boche, and Janis Nötzel. "Quantum Capacity under Adversarial Quantum Noise: Arbitrarily Varying Quantum Channels." Communications in Mathematical Physics 317, no. 1 (November 20, 2012): 103–56. http://dx.doi.org/10.1007/s00220-012-1613-x.
Full textAnantharamu, Lakshmi, Bogdan S. Chlebus, Dariusz R. Kowalski, and Mariusz A. Rokicki. "Packet latency of deterministic broadcasting in adversarial multiple access channels." Journal of Computer and System Sciences 99 (February 2019): 27–52. http://dx.doi.org/10.1016/j.jcss.2018.07.001.
Full textDapogny, Arnaud, Matthieu Cord, and Patrick Perez. "The Missing Data Encoder: Cross-Channel Image Completion with Hide-and-Seek Adversarial Network." Proceedings of the AAAI Conference on Artificial Intelligence 34, no. 07 (April 3, 2020): 10688–95. http://dx.doi.org/10.1609/aaai.v34i07.6696.
Full textSun, Chonggao, Yonghong Chen, Hui Tian, and Shuhong Wu. "Covert Timing Channels Detection Based on Auxiliary Classifier Generative Adversarial Network." IEEE Open Journal of the Computer Society 2 (2021): 407–18. http://dx.doi.org/10.1109/ojcs.2021.3131598.
Full textSarkar, Rupak, and Ashiqur R. KhudaBukhsh. "Are Chess Discussions Racist? An Adversarial Hate Speech Data Set (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 18 (May 18, 2021): 15881–82. http://dx.doi.org/10.1609/aaai.v35i18.17937.
Full textSucholutsky, Ilia, and Matthias Schonlau. "SecDD: Efficient and Secure Method for Remotely Training Neural Networks (Student Abstract)." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 18 (May 18, 2021): 15897–98. http://dx.doi.org/10.1609/aaai.v35i18.17945.
Full textSengupta, S., S. Anand, K. Hong, and R. Chandramouli. "On Adversarial Games in Dynamic Spectrum Access Networking based Covert Timing Channels?" ACM SIGMOBILE Mobile Computing and Communications Review 13, no. 2 (September 25, 2009): 96–107. http://dx.doi.org/10.1145/1621076.1621086.
Full textYuan, X., J. Tian, and P. Reinartz. "GENERATING ARTIFICIAL NEAR INFRARED SPECTRAL BAND FROM RGB IMAGE USING CONDITIONAL GENERATIVE ADVERSARIAL NETWORK." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences V-3-2020 (August 3, 2020): 279–85. http://dx.doi.org/10.5194/isprs-annals-v-3-2020-279-2020.
Full textLi, Guanyue, Qianfen Jiao, Sheng Qian, Si Wu, and Hau-San Wong. "High Fidelity GAN Inversion via Prior Multi-Subspace Feature Composition." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 9 (May 18, 2021): 8366–74. http://dx.doi.org/10.1609/aaai.v35i9.17017.
Full textChen, Jiahao, Chong Wu, Hu Chen, and Peng Cheng. "Unsupervised Dark-Channel Attention-Guided CycleGAN for Single-Image Dehazing." Sensors 20, no. 21 (October 23, 2020): 6000. http://dx.doi.org/10.3390/s20216000.
Full textYadav, Jyoti Deshwal, Vivek K. Dwivedi, and Saurabh Chaturvedi. "ResNet-Enabled cGAN Model for Channel Estimation in Massive MIMO System." Wireless Communications and Mobile Computing 2022 (August 29, 2022): 1–9. http://dx.doi.org/10.1155/2022/2697932.
Full textBache, Florian, Christina Plump, Jonas Wloka, Tim Güneysu, and Rolf Drechsler. "Evaluation of (power) side-channels in cryptographic implementations." it - Information Technology 61, no. 1 (February 25, 2019): 15–28. http://dx.doi.org/10.1515/itit-2018-0028.
Full textКамилов, Э. М., and А. А. Егоров. "3D Porous Structure Image Generation." Успехи кибернетики / Russian Journal of Cybernetics, no. 3(3) (September 30, 2020): 33–40. http://dx.doi.org/10.51790/2712-9942-2020-1-3-4.
Full textSimon, Paul M., and Scott Graham. "Extending the Quality of Secure Service Model to Multi-Hop Networks." Journal of Cybersecurity and Privacy 1, no. 4 (December 15, 2021): 793–803. http://dx.doi.org/10.3390/jcp1040038.
Full textLiu, Qiao, Guang Gong, Yong Wang, and Hui Li. "A Novel Secure Transmission Scheme in MIMO Two-Way Relay Channels with Physical Layer Approach." Mobile Information Systems 2017 (2017): 1–12. http://dx.doi.org/10.1155/2017/7843843.
Full textZhao, Wenxuan, Yaqin Zhao, Liqi Feng, and Jiaxi Tang. "Attention Optimized Deep Generative Adversarial Network for Removing Uneven Dense Haze." Symmetry 14, no. 1 (December 21, 2021): 1. http://dx.doi.org/10.3390/sym14010001.
Full textBoche, Holger, Minglai Cai, Janis Nötzel, and Christian Deppe. "Secret message transmission over quantum channels under adversarial quantum noise: Secrecy capacity and super-activation." Journal of Mathematical Physics 60, no. 6 (June 2019): 062202. http://dx.doi.org/10.1063/1.5019461.
Full textQiao, Junbo, Xing Wang, Ji Chen, and Muwei Jian. "Low-Light Image Enhancement with an Anti-Attention Block-Based Generative Adversarial Network." Electronics 11, no. 10 (May 19, 2022): 1627. http://dx.doi.org/10.3390/electronics11101627.
Full textZhang, Jianfu, Yuanyuan Huang, Yaoyi Li, Weijie Zhao, and Liqing Zhang. "Multi-Attribute Transfer via Disentangled Representation." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 9195–202. http://dx.doi.org/10.1609/aaai.v33i01.33019195.
Full textLiu, Changhong, Hongyin Li, Zhongwei Liang, Yongjun Zhang, Yier Yan, Ray Y. Zhong, and Shaohu Peng. "A Novel Deep-Learning-Based Enhanced Texture Transformer Network for Reference Image Super-Resolution." Electronics 11, no. 19 (September 24, 2022): 3038. http://dx.doi.org/10.3390/electronics11193038.
Full textSalomon, Dor, Amir Weiss, and Itamar Levi. "Improved Filtering Techniques for Single- and Multi-Trace Side-Channel Analysis." Cryptography 5, no. 3 (September 13, 2021): 24. http://dx.doi.org/10.3390/cryptography5030024.
Full textKaplunov, A. I. "Modern Approaches to Understanding the Administrative Process as a Result and the Basis for the Development of Domestic Administrative Procedural Legislation." Siberian Law Review 18, no. 3 (October 21, 2021): 261–76. http://dx.doi.org/10.19073/2658-7602-2021-18-3-261-276.
Full textKang, Wei. "Application of Multi-Measurement Vector Based on the Wireless Sensor Network in Mechanical Fault Diagnosis." Mathematical Problems in Engineering 2022 (September 7, 2022): 1–7. http://dx.doi.org/10.1155/2022/2390119.
Full textIllarionova, Svetlana, Dmitrii Shadrin, Alexey Trekin, Vladimir Ignatiev, and Ivan Oseledets. "Generation of the NIR Spectral Band for Satellite Images with Convolutional Neural Networks." Sensors 21, no. 16 (August 21, 2021): 5646. http://dx.doi.org/10.3390/s21165646.
Full textXiong, Quan, Liping Di, Quanlong Feng, Diyou Liu, Wei Liu, Xuli Zan, Lin Zhang, et al. "Deriving Non-Cloud Contaminated Sentinel-2 Images with RGB and Near-Infrared Bands from Sentinel-1 Images Based on a Conditional Generative Adversarial Network." Remote Sensing 13, no. 8 (April 14, 2021): 1512. http://dx.doi.org/10.3390/rs13081512.
Full textWails, Ryan, Andrew Stange, Eliana Troper, Aylin Caliskan, Roger Dingledine, Rob Jansen, and Micah Sherr. "Learning to Behave: Improving Covert Channel Security with Behavior-Based Designs." Proceedings on Privacy Enhancing Technologies 2022, no. 3 (July 2022): 179–99. http://dx.doi.org/10.56553/popets-2022-0068.
Full textWieslander, Håkan, Ankit Gupta, Ebba Bergman, Erik Hallström, and Philip John Harrison. "Learning to see colours: Biologically relevant virtual staining for adipocyte cell images." PLOS ONE 16, no. 10 (October 15, 2021): e0258546. http://dx.doi.org/10.1371/journal.pone.0258546.
Full textLawrance, Bendict, Harim Lee, Eunsu Park, Il-Hyun Cho, Yong-Jae Moon, Jin-Yi Lee, Shanmugaraju A, and Sumiaya Rahman. "Generation of Solar Coronal White-light Images from SDO/AIA EUV Images by Deep Learning." Astrophysical Journal 937, no. 2 (October 1, 2022): 111. http://dx.doi.org/10.3847/1538-4357/ac8c24.
Full textJiang, Xin, Chunlei Zhao, Ming Zhu, Zhicheng Hao, and Wen Gao. "Residual Spatial and Channel Attention Networks for Single Image Dehazing." Sensors 21, no. 23 (November 27, 2021): 7922. http://dx.doi.org/10.3390/s21237922.
Full textLiang, Youwei, and Dong Huang. "Large Norms of CNN Layers Do Not Hurt Adversarial Robustness." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 10 (May 18, 2021): 8565–73. http://dx.doi.org/10.1609/aaai.v35i10.17039.
Full textAmandong, Egute. "Alternative Dispute Resolution (ADR) Hybrid in Cameroon as a Form of Legal Protection for Consumers of Defective Products." Brawijaya Law Journal 8, no. 1 (April 30, 2021): 54–69. http://dx.doi.org/10.21776/ub.blj.2021.008.01.04.
Full textGoebel, Michael, Lakshmanan Nataraj, Tejaswi Nanjundaswamy, Tajuddin Manhar Mohammed, Shivkumar Chandrasekaran, and B. S. Manjunath. "Detection, Attribution and Localization of GAN Generated Images." Electronic Imaging 2021, no. 4 (January 18, 2021): 276–1. http://dx.doi.org/10.2352/issn.2470-1173.2021.4.mwsf-276.
Full textPoterek, Q., P. A. Herrault, G. Forestier, and D. Schwartz. "REVEALING LONG-TERM PHYSIOLOGICAL TRAJECTORIES OF GRASSLANDS FROM LEGACY B&W AERIAL PHOTOGRAPHS." ISPRS Annals of Photogrammetry, Remote Sensing and Spatial Information Sciences V-3-2020 (August 3, 2020): 549–57. http://dx.doi.org/10.5194/isprs-annals-v-3-2020-549-2020.
Full textKhaleghi, Nastaran, Tohid Yousefi Rezaii, Soosan Beheshti, Saeed Meshgini, Sobhan Sheykhivand, and Sebelan Danishvar. "Visual Saliency and Image Reconstruction from EEG Signals via an Effective Geometric Deep Network-Based Generative Adversarial Network." Electronics 11, no. 21 (November 7, 2022): 3637. http://dx.doi.org/10.3390/electronics11213637.
Full textKalbantner, Jan, Konstantinos Markantonakis, Darren Hurley-Smith, Raja Naeem Akram, and Benjamin Semal. "P2PEdge: A Decentralised, Scalable P2P Architecture for Energy Trading in Real-Time." Energies 14, no. 3 (January 25, 2021): 606. http://dx.doi.org/10.3390/en14030606.
Full textShi, Lei. "Application Model Construction of Traditional Cultural Elements in Illustration Design under Artificial Intelligence Background." Mobile Information Systems 2022 (June 14, 2022): 1–9. http://dx.doi.org/10.1155/2022/7412066.
Full textLu, Xiaoquan, Yu Zhou, Zhongdong Wang, Yongxian Yi, Longji Feng, and Fei Wang. "Knowledge Embedded Semi-Supervised Deep Learning for Detecting Non-Technical Losses in the Smart Grid." Energies 12, no. 18 (September 6, 2019): 3452. http://dx.doi.org/10.3390/en12183452.
Full textShejole, Prof Sakshi. "Secret Communication Using Multi-Image Steganography and Face Recognition." International Journal for Research in Applied Science and Engineering Technology 10, no. 11 (November 30, 2022): 1260–63. http://dx.doi.org/10.22214/ijraset.2022.47549.
Full textMeng Qi, 孟奇, 苗华 Miao Hua, 李琳 Li Lin, 国博 Guo Bo, 刘婷婷 Liu Tingting, and 米士隆 Mi Shilong. "基于双通道生成对抗网络的镜片缺陷数据增强." Laser & Optoelectronics Progress 58, no. 20 (2021): 2015001. http://dx.doi.org/10.3788/lop202158.2015001.
Full textAdelabu Salawu, Mashud Layiwola, and Simeon Abiodun Aina. "Education for Peace and Justice in Nigeria: A Critical Analysis 1999 – 2015." World Journal of Social Science 4, no. 1 (January 25, 2017): 40. http://dx.doi.org/10.5430/wjss.v4n1p40.
Full textHou Chunping, 侯春萍, 王霄聪 Wang Xiaocong, 夏晗 Xia Han, and 杨阳 Yang Yang. "基于双通路生成对抗网络的红外与可见光图像融合方法." Laser & Optoelectronics Progress 58, no. 14 (2021): 1410024. http://dx.doi.org/10.3788/lop202158.1410024.
Full text