A Survey on Adversarial Attack in the Age of Artificial Intelligence
Published 2021 View Full Article
- Home
- Publications
- Publication Search
- Publication Details
Title
A Survey on Adversarial Attack in the Age of Artificial Intelligence
Authors
Keywords
-
Journal
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 2021, Issue -, Pages 1-22
Publisher
Hindawi Limited
Online
2021-06-23
DOI
10.1155/2021/4907754
References
Ask authors/readers for more resources
Related references
Note: Only part of the references are listed.- A sentence-level text adversarial attack algorithm against IIoT based smart grid
- (2021) Jialiang Dong et al. Computer Networks
- Toward a blockchain-based framework for challenge-based collaborative intrusion detection
- (2020) Wenjuan Li et al. International Journal of Information Security
- Detection of algorithmically-generated domains: An adversarial machine learning approach
- (2020) Mohammadhadi Alaeiyan et al. COMPUTER COMMUNICATIONS
- An adversarial attack on DNN-based black-box object detectors
- (2020) Yajie Wang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Defending network intrusion detection systems against adversarial evasion attacks
- (2020) Marek Pawlicki et al. Future Generation Computer Systems-The International Journal of eScience
- Blockchain-based authentication and authorization for smart city applications
- (2020) Christian Esposito et al. INFORMATION PROCESSING & MANAGEMENT
- Review of Artificial Intelligence Adversarial Attack and Defense Technologies
- (2019) Shilin Qiu et al. Applied Sciences-Basel
- Neural malware analysis with attention mechanism
- (2019) Hiromu Yakura et al. COMPUTERS & SECURITY
- One Pixel Attack for Fooling Deep Neural Networks
- (2019) Jiawei Su et al. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
- Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing
- (2019) Zhenyu Zhou et al. IEEE Transactions on Systems Man Cybernetics-Systems
- Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
- (2018) Ding Wang et al. IEEE Transactions on Industrial Informatics
- A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
- (2018) Daming Li et al. INFORMATION SCIENCES
- Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
- (2018) Battista Biggio et al. PATTERN RECOGNITION
- Detecting Malware with an Ensemble Method Based on Deep Neural Network
- (2018) Jinpei Yan et al. Security and Communication Networks
- A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
- (2018) Shuming Qiu et al. IEEE Access
- Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
- (2018) Naveed Akhtar et al. IEEE Access
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
- (2016) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- Differential Evolution: A Survey of the State-of-the-Art
- (2010) Swagatam Das et al. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
Add your recorded webinar
Do you already have a recorded webinar? Grow your audience and get more views by easily listing your recording on Peeref.
Upload NowCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now