-
1
-
2
-
3Published 2019Table of Contents: “…Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent…”
Full Text via HEAL-Link
Electronic eBook -
4Published 2018Table of Contents: “… Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics…”
Full Text via HEAL-Link
Electronic eBook -
5Published 2018Table of Contents: “… and European Law -- Defence Against Attacks and Anonymity -- SATYA: Defending against Adversarial Attacks using…”
Full Text via HEAL-Link
Electronic eBook -
6Published 2019Table of Contents: “… in Satellite Images using Reconstruction Errors of Joint Autoencoders -- Physical Adversarial Attacks…”
Full Text via HEAL-Link
Electronic eBook -
7Published 2019Table of Contents: “… in Clinical Trials -- ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector…”
Full Text via HEAL-Link
Electronic eBook -
8Published 2008Table of Contents: “… -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing…”
Full Text via HEAL-Link
Electronic eBook -
9Published 2019Table of Contents: “… for Human-Guided Data Exploration -- ADAGIO: Interactive Experimentation with Adversarial Attack and Defense…”
Full Text via HEAL-Link
Electronic eBook -
10Published 2019Table of Contents: “… -- Evaluating CNNs on the Gestalt Principle of Closure -- Recovering Localized Adversarial Attacks…”
Full Text via HEAL-Link
Electronic eBook -
11
-
12
-
13