Results 281 to 290 of about 5,561,446 (302)
Some of the next articles are maybe not open access.
Adversarial examples: A survey
2018 Baltic URSI Symposium (URSI), 2018Adversarial examples are a phenomenon that have gathered a lot of attention in recent studies. The fact that the addition of very small, but carefully crafted perturbations to the inputs of sophisticated and high performing machine learning models may cause them to make significant errors, is both fascinating and important.
openaire +1 more source
Adversarial Machine Learning for Network Intrusion Detection Systems: A Comprehensive Survey
IEEE Communications Surveys and Tutorials, 2023Ke He +2 more
exaly
A Survey of Adversarial Attack and Defense Methods for Malware Classification in Cyber Security
IEEE Communications Surveys and Tutorials, 2023Senming Yan, Jing Ren, Wei Wang
exaly
A Survey on Generative Adversarial Networks: Variants, Applications, and Training
ACM Computing Surveys, 2022Songyuan Li
exaly
Adversarial Machine Learning Attacks and Defense Methods in the Cyber Security Domain
ACM Computing Surveys, 2022Ishai Rosenberg, Asaf Shabtai
exaly
Adversarial Machine Learning in Wireless Communications Using RF Data: A Review
IEEE Communications Surveys and Tutorials, 2023Damilola Adesina +2 more
exaly
A Survey of Adversarial Defenses and Robustness in NLP
ACM Computing Surveys, 2023Shreya Goyal +2 more
exaly

