Results 261 to 270 of about 94,262 (290)
Some of the next articles are maybe not open access.
Sinkhorn Adversarial Attack and Defense
IEEE Transactions on Image Processing, 2022Adversarial attacks have been extensively investigated in the recent past. Quite interestingly, a majority of these attacks primarily work in the lp space. In this work, we propose a novel approach for generating adversarial samples using Wasserstein distance.
openaire +2 more sources
Audio adversarial attack: HIS attack
International Conference on Computer Network Security and Software Engineering (CNSSE 2022), 2022Jian Ma, Da Luo
openaire +1 more source
Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
IEEE Communications Surveys and Tutorials, 2023Damilola Adesina +2 more
exaly

