Статті в журналах з теми "Adversarial Defence"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Adversarial Defence".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Jiang, Guoteng, Zhuang Qian, Qiu-Feng Wang, Yan Wei, and Kaizhu Huang. "Adversarial Attack and Defence on Handwritten Chinese Character Recognition." Journal of Physics: Conference Series 2278, no. 1 (May 1, 2022): 012023. http://dx.doi.org/10.1088/1742-6596/2278/1/012023.
Повний текст джерелаHuang, Bo, Zhiwei Ke, Yi Wang, Wei Wang, Linlin Shen, and Feng Liu. "Adversarial Defence by Diversified Simultaneous Training of Deep Ensembles." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 9 (May 18, 2021): 7823–31. http://dx.doi.org/10.1609/aaai.v35i9.16955.
Повний текст джерелаPawlicki, Marek, and Ryszard S. Choraś. "Preprocessing Pipelines including Block-Matching Convolutional Neural Network for Image Denoising to Robustify Deep Reidentification against Evasion Attacks." Entropy 23, no. 10 (October 3, 2021): 1304. http://dx.doi.org/10.3390/e23101304.
Повний текст джерелаLal, Sheeba, Saeed Ur Rehman, Jamal Hussain Shah, Talha Meraj, Hafiz Tayyab Rauf, Robertas Damaševičius, Mazin Abed Mohammed, and Karrar Hameed Abdulkareem. "Adversarial Attack and Defence through Adversarial Training and Feature Fusion for Diabetic Retinopathy Recognition." Sensors 21, no. 11 (June 7, 2021): 3922. http://dx.doi.org/10.3390/s21113922.
Повний текст джерелаJohnston, Ed. "The adversarial defence lawyer: Myths, disclosure and efficiency—A contemporary analysis of the role in the era of the Criminal Procedure Rules." International Journal of Evidence & Proof 24, no. 1 (August 26, 2019): 35–58. http://dx.doi.org/10.1177/1365712719867972.
Повний текст джерелаXu, Enhui, Xiaolin Zhang, Yongping Wang, Shuai Zhang, Lixin Lu, and Li Xu. "WordRevert: Adversarial Examples Defence Method for Chinese Text Classification." IEEE Access 10 (2022): 28832–41. http://dx.doi.org/10.1109/access.2022.3157521.
Повний текст джерелаBruce, Neil. "Defence expenditures by countries in allied and adversarial relationships." Defence Economics 1, no. 3 (May 1990): 179–95. http://dx.doi.org/10.1080/10430719008404661.
Повний текст джерелаStriletska, Oksana. "Establishment and Development of the Adversarial Principle in the Criminal Process." Path of Science 7, no. 7 (July 31, 2021): 1010–16. http://dx.doi.org/10.22178/pos.72-2.
Повний текст джерелаMacfarlane, Julie. "The Anglican Church’s sexual abuse defence playbook." Theology 124, no. 3 (May 2021): 182–89. http://dx.doi.org/10.1177/0040571x211008547.
Повний текст джерелаZhang, Bowen, Benedetta Tondi, Xixiang Lv, and Mauro Barni. "Challenging the Adversarial Robustness of DNNs Based on Error-Correcting Output Codes." Security and Communication Networks 2020 (November 12, 2020): 1–11. http://dx.doi.org/10.1155/2020/8882494.
Повний текст джерелаHuang, Shize, Xiaowen Liu, Xiaolu Yang, Zhaoxin Zhang, and Lingyu Yang. "Two Improved Methods of Generating Adversarial Examples against Faster R-CNNs for Tram Environment Perception Systems." Complexity 2020 (September 22, 2020): 1–10. http://dx.doi.org/10.1155/2020/6814263.
Повний текст джерелаKehoe, Aidan, Peter Wittek, Yanbo Xue, and Alejandro Pozas-Kerstjens. "Defence against adversarial attacks using classical and quantum-enhanced Boltzmann machines †." Machine Learning: Science and Technology 2, no. 4 (July 15, 2021): 045006. http://dx.doi.org/10.1088/2632-2153/abf834.
Повний текст джерелаGao, Wei, Yunqing Liu, Yi Zeng, Quanyang Liu, and Qi Li. "SAR Image Ship Target Detection Adversarial Attack and Defence Generalization Research." Sensors 23, no. 4 (February 17, 2023): 2266. http://dx.doi.org/10.3390/s23042266.
Повний текст джерелаJohnston, Ed. "All Rise for the Interventionist." Journal of Criminal Law 80, no. 3 (June 2016): 201–13. http://dx.doi.org/10.1177/0022018316647870.
Повний текст джерелаPoptchev, Peter. "NATO-EU Cooperation in Cybersecurity and Cyber Defence Offers Unrivalled Advantages." Information & Security: An International Journal 45 (2020): 35–55. http://dx.doi.org/10.11610/isij.4503.
Повний текст джерелаLi, Jipeng, Xinyi Li, and Chenjing Zhang. "Analysis on Security and Privacy-preserving in Federated Learning." Highlights in Science, Engineering and Technology 4 (July 26, 2022): 349–58. http://dx.doi.org/10.54097/hset.v4i.923.
Повний текст джерелаDuff, Peter. "Disclosure in Scottish Criminal Procedure: Another Step in an Inquisitorial Direction?" International Journal of Evidence & Proof 11, no. 3 (July 2007): 153–80. http://dx.doi.org/10.1350/ijep.2007.11.3.153.
Повний текст джерелаMao, Junjie, Bin Weng, Tianqiang Huang, Feng Ye, and Liqing Huang. "Research on Multimodality Face Antispoofing Model Based on Adversarial Attacks." Security and Communication Networks 2021 (August 9, 2021): 1–12. http://dx.doi.org/10.1155/2021/3670339.
Повний текст джерелаSingh, Abhijit, and Biplab Sikdar. "Adversarial Attack and Defence Strategies for Deep-Learning-Based IoT Device Classification Techniques." IEEE Internet of Things Journal 9, no. 4 (February 15, 2022): 2602–13. http://dx.doi.org/10.1109/jiot.2021.3138541.
Повний текст джерелаAmbos, Kai. "International criminal procedure: "adversarial", "inquisitorial" or mixed?" International Criminal Law Review 3, no. 1 (2003): 1–37. http://dx.doi.org/10.1163/156753603767877084.
Повний текст джерелаDuddu, Vasisht. "A Survey of Adversarial Machine Learning in Cyber Warfare." Defence Science Journal 68, no. 4 (June 26, 2018): 356. http://dx.doi.org/10.14429/dsj.68.12371.
Повний текст джерелаHasneziri, Luan. "The Adversarial Proceedings Principle in the Civil Process." European Journal of Marketing and Economics 4, no. 1 (May 15, 2021): 88. http://dx.doi.org/10.26417/548nth20i.
Повний текст джерелаLeitch, Shirley, and Juliet Roper. "AD Wars: Adversarial Advertising by Interest Groups in a New Zealand General Election." Media International Australia 92, no. 1 (August 1999): 103–16. http://dx.doi.org/10.1177/1329878x9909200112.
Повний текст джерелаSun, Guangling, Yuying Su, Chuan Qin, Wenbo Xu, Xiaofeng Lu, and Andrzej Ceglowski. "Complete Defense Framework to Protect Deep Neural Networks against Adversarial Examples." Mathematical Problems in Engineering 2020 (May 11, 2020): 1–17. http://dx.doi.org/10.1155/2020/8319249.
Повний текст джерелаMcCarthy, Andrew, Essam Ghadafi, Panagiotis Andriotis, and Phil Legg. "Functionality-Preserving Adversarial Machine Learning for Robust Classification in Cybersecurity and Intrusion Detection Domains: A Survey." Journal of Cybersecurity and Privacy 2, no. 1 (March 17, 2022): 154–90. http://dx.doi.org/10.3390/jcp2010010.
Повний текст джерелаHuang, Xiaowei, Daniel Kroening, Wenjie Ruan, James Sharp, Youcheng Sun, Emese Thamo, Min Wu, and Xinping Yi. "A survey of safety and trustworthiness of deep neural networks: Verification, testing, adversarial attack and defence, and interpretability." Computer Science Review 37 (August 2020): 100270. http://dx.doi.org/10.1016/j.cosrev.2020.100270.
Повний текст джерелаRaj, Rohit, Jayant Kumar, and Akriti Kumari. "HOW AI USED TO PREVENT CYBER THREATS." International Research Journal of Computer Science 9, no. 7 (July 31, 2022): 146–51. http://dx.doi.org/10.26562/irjcs.2022.v0907.002.
Повний текст джерелаHodgson, Jacqueline. "Constructing the Pre-Trial Role of the Defence in French Criminal Procedure: An Adversarial Outsider in an Inquisitorial Process?" International Journal of Evidence & Proof 6, no. 1 (January 2002): 1–16. http://dx.doi.org/10.1177/136571270200600101.
Повний текст джерелаPark, Sanglee, and Jungmin So. "On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification." Applied Sciences 10, no. 22 (November 14, 2020): 8079. http://dx.doi.org/10.3390/app10228079.
Повний текст джерелаRavishankar, Monica, D. Vijay Rao, and C. R. S. Kumar. "A Game Theoretic Software Test-bed for Cyber Security Analysis of Critical Infrastructure." Defence Science Journal 68, no. 1 (December 18, 2017): 54. http://dx.doi.org/10.14429/dsj.68.11402.
Повний текст джерелаPochylá, Veronika. "Previous witness testimony as immediate or urgent action and its admissibility in court." International and Comparative Law Review 15, no. 2 (December 1, 2015): 145–59. http://dx.doi.org/10.1515/iclr-2016-0041.
Повний текст джерелаMoulinou, Iphigenia. "Explicit and implicit discursive strategies and moral order in a trial process." Journal of Language Aggression and Conflict 7, no. 1 (June 12, 2019): 105–32. http://dx.doi.org/10.1075/jlac.00021.mou.
Повний текст джерелаFatehi, Nina, Qutaiba Alasad, and Mohammed Alawad. "Towards Adversarial Attacks for Clinical Document Classification." Electronics 12, no. 1 (December 28, 2022): 129. http://dx.doi.org/10.3390/electronics12010129.
Повний текст джерелаesh, Rishik, Ru pasri, Tamil selvan, Yogana rasimman, and Saran Sujai. "Intrusion of Attacks in Puppet and Zombie Attacking and Defence Model Using BW-DDOS." International Academic Journal of Innovative Research 9, no. 1 (June 28, 2022): 13–19. http://dx.doi.org/10.9756/iajir/v9i1/iajir0903.
Повний текст джерелаGröndahl, Tommi, and N. Asokan. "Effective writing style transfer via combinatorial paraphrasing." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (October 1, 2020): 175–95. http://dx.doi.org/10.2478/popets-2020-0068.
Повний текст джерелаHossain‐McKenzie, Shamina, Kaushik Raghunath, Katherine Davis, Sriharsha Etigowni, and Saman Zonouz. "Strategy for distributed controller defence: Leveraging controller roles and control support groups to maintain or regain control in cyber‐adversarial power systems." IET Cyber-Physical Systems: Theory & Applications 6, no. 2 (April 9, 2021): 80–92. http://dx.doi.org/10.1049/cps2.12006.
Повний текст джерелаLiu, Ninghao, Mengnan Du, Ruocheng Guo, Huan Liu, and Xia Hu. "Adversarial Attacks and Defenses." ACM SIGKDD Explorations Newsletter 23, no. 1 (May 26, 2021): 86–99. http://dx.doi.org/10.1145/3468507.3468519.
Повний текст джерелаRosenberg, Ishai, Asaf Shabtai, Yuval Elovici, and Lior Rokach. "Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain." ACM Computing Surveys 54, no. 5 (June 2021): 1–36. http://dx.doi.org/10.1145/3453158.
Повний текст джерелаHuang, Yang, Yuling Chen, Xuewei Wang, Jing Yang, and Qi Wang. "Promoting Adversarial Transferability via Dual-Sampling Variance Aggregation and Feature Heterogeneity Attacks." Electronics 12, no. 3 (February 3, 2023): 767. http://dx.doi.org/10.3390/electronics12030767.
Повний текст джерелаImam, Niddal H., and Vassilios G. Vassilakis. "A Survey of Attacks Against Twitter Spam Detectors in an Adversarial Environment." Robotics 8, no. 3 (July 4, 2019): 50. http://dx.doi.org/10.3390/robotics8030050.
Повний текст джерелаLuo, Yifan, Feng Ye, Bin Weng, Shan Du, and Tianqiang Huang. "A Novel Defensive Strategy for Facial Manipulation Detection Combining Bilateral Filtering and Joint Adversarial Training." Security and Communication Networks 2021 (August 2, 2021): 1–10. http://dx.doi.org/10.1155/2021/4280328.
Повний текст джерелаGong, Xiaopeng, Wanchun Chen, and Zhongyuan Chen. "Intelligent Game Strategies in Target-Missile-Defender Engagement Using Curriculum-Based Deep Reinforcement Learning." Aerospace 10, no. 2 (January 31, 2023): 133. http://dx.doi.org/10.3390/aerospace10020133.
Повний текст джерелаHeffernan, Liz. "The participation of victims in the trial process." Northern Ireland Legal Quarterly 68, no. 4 (December 21, 2017): 491–504. http://dx.doi.org/10.53386/nilq.v68i4.60.
Повний текст джерелаZheng, Tianhang, Changyou Chen, and Kui Ren. "Distributionally Adversarial Attack." Proceedings of the AAAI Conference on Artificial Intelligence 33 (July 17, 2019): 2253–60. http://dx.doi.org/10.1609/aaai.v33i01.33012253.
Повний текст джерелаYao, Yuan, Haoxi Zhong, Zhengyan Zhang, Xu Han, Xiaozhi Wang, Kai Zhang, Chaojun Xiao, Guoyang Zeng, Zhiyuan Liu, and Maosong Sun. "Adversarial Language Games for Advanced Natural Language Intelligence." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 16 (May 18, 2021): 14248–56. http://dx.doi.org/10.1609/aaai.v35i16.17676.
Повний текст джерелаSilva, Samuel Henrique, Arun Das, Adel Aladdini, and Peyman Najafirad. "Adaptive Clustering of Robust Semantic Representations for Adversarial Image Purification on Social Networks." Proceedings of the International AAAI Conference on Web and Social Media 16 (May 31, 2022): 968–79. http://dx.doi.org/10.1609/icwsm.v16i1.19350.
Повний текст джерелаZeng, Huimin, Chen Zhu, Tom Goldstein, and Furong Huang. "Are Adversarial Examples Created Equal? A Learnable Weighted Minimax Risk for Robustness under Non-uniform Attacks." Proceedings of the AAAI Conference on Artificial Intelligence 35, no. 12 (May 18, 2021): 10815–23. http://dx.doi.org/10.1609/aaai.v35i12.17292.
Повний текст джерелаZhang, Ziwei, and Dengpan Ye. "Defending against Deep-Learning-Based Flow Correlation Attacks with Adversarial Examples." Security and Communication Networks 2022 (March 27, 2022): 1–11. http://dx.doi.org/10.1155/2022/2962318.
Повний текст джерелаShi, Lin, Teyi Liao, and Jianfeng He. "Defending Adversarial Attacks against DNN Image Classification Models by a Noise-Fusion Method." Electronics 11, no. 12 (June 8, 2022): 1814. http://dx.doi.org/10.3390/electronics11121814.
Повний текст джерелаLuo, Zhirui, Qingqing Li, and Jun Zheng. "A Study of Adversarial Attacks and Detection on Deep Learning-Based Plant Disease Identification." Applied Sciences 11, no. 4 (February 20, 2021): 1878. http://dx.doi.org/10.3390/app11041878.
Повний текст джерела