Experimental demonstration of adversarial examples in learning topological phases. [PDF]
Zhang H +9 more
europepmc +1 more source
Detecting Adversarial Examples by Input Transformations, Defense Perturbations, and Voting [PDF]
Federico Nesti +2 more
openalex +1 more source
DualFlow: Generating imperceptible adversarial examples by flow field and normalize flow-based model. [PDF]
Liu R +6 more
europepmc +1 more source
Crafting Adversarial Examples for Neural Machine Translation [PDF]
Xinze Zhang +3 more
openalex +1 more source
A Universal Detection Method for Adversarial Examples and Fake Images. [PDF]
Lai J, Huo Y, Hou R, Wang X.
europepmc +1 more source
Robust Text CAPTCHAs Using Adversarial Examples [PDF]
Rulin Shao +4 more
openalex +1 more source
Surreptitious Adversarial Examples through Functioning QR Code. [PDF]
Chindaudom A +3 more
europepmc +1 more source
Adversarial examples, in the context of computer vision, are inputs deliberately crafted to deceive or mislead artificial neural networks. These examples exploit vulnerabilities in neural networks, resulting in minimal alterations to the original input ...
A.V. Trusov +2 more
doaj +1 more source
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns. [PDF]
Zong W, Chow YW, Susilo W, Kim J, Le NT.
europepmc +1 more source
Universal adversarial examples and perturbations for quantum classifiers. [PDF]
Gong W, Deng DL.
europepmc +1 more source

