Results 251 to 260 of about 5,561,446 (302)
Tactical-Grade Wearables and Authentication Biometrics. [PDF]
Agiomavritis F, Karanasiou I.
europepmc +1 more source
SecuFL-IoT: an adaptive privacy-preserving federated learning framework for anomaly detection in smart industrial networks. [PDF]
Alqazzaz A.
europepmc +1 more source
Missing Value Imputation With Adversarial Random Forests-MissARF. [PDF]
Golchian P +3 more
europepmc +1 more source
Point cloud generation adversarial network based on self-attention and curvature. [PDF]
Sun F +5 more
europepmc +1 more source
Real-world face super-resolution based on generative adversarial and face alignment networks. [PDF]
Fathy H, Faheem MT, Elbasiony R.
europepmc +1 more source
Adversarial Defense without <i>Adversarial Defense</i>: Enhancing Language Model Robustness via Instance-level Principal Component Removal. [PDF]
Wang Y +5 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Principal Component Adversarial Example
IEEE Transactions on Image Processing, 2020Despite having achieved excellent performance on various tasks, deep neural networks have been shown to be susceptible to adversarial examples, i.e., visual inputs crafted with structural imperceptible noise.
Yonggang Zhang +4 more
semanticscholar +3 more sources

