Showing 1 - 13 results of 13 for search '"Adversarial attack"', query time: 0.09s Refine Results
  1. 1
  2. 2
  3. 3
    Published 2019
    Table of Contents: “…Adversarial Attack, Defense, and Applications with Deep Learning Frameworks -- Intelligent…”
    Full Text via HEAL-Link
    Electronic eBook
  4. 4
    Published 2018
    Table of Contents: “… Adversarial Attacks in Network and Cyber Environments -- The Dark Web -- Tor black markets: economics…”
    Full Text via HEAL-Link
    Electronic eBook
  5. 5
    Published 2018
    Table of Contents: “… and European Law -- Defence Against Attacks and Anonymity -- SATYA: Defending against Adversarial Attacks using…”
    Full Text via HEAL-Link
    Electronic eBook
  6. 6
    Published 2019
    Table of Contents: “… in Satellite Images using Reconstruction Errors of Joint Autoencoders -- Physical Adversarial Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  7. 7
    Published 2019
    Table of Contents: “… in Clinical Trials -- ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector…”
    Full Text via HEAL-Link
    Electronic eBook
  8. 8
    Published 2008
    Table of Contents: “… -- Efficient Handling of Adversary Attacks in Aggregation Applications -- Symmetric Key Approaches to Securing…”
    Full Text via HEAL-Link
    Electronic eBook
  9. 9
    Published 2019
    Table of Contents: “… for Human-Guided Data Exploration -- ADAGIO: Interactive Experimentation with Adversarial Attack and Defense…”
    Full Text via HEAL-Link
    Electronic eBook
  10. 10
    Published 2019
    Table of Contents: “… -- Evaluating CNNs on the Gestalt Principle of Closure -- Recovering Localized Adversarial Attacks…”
    Full Text via HEAL-Link
    Electronic eBook
  11. 11
  12. 12
    Published 2018
    Full Text via HEAL-Link
    Electronic eBook
  13. 13
Search Tools: RSS Feed Email Search