标题
A Survey on Adversarial Attack in the Age of Artificial Intelligence
作者
关键词
-
出版物
WIRELESS COMMUNICATIONS & MOBILE COMPUTING
Volume 2021, Issue -, Pages 1-22
出版商
Hindawi Limited
发表日期
2021-06-23
DOI
10.1155/2021/4907754
参考文献
相关参考文献
注意:仅列出部分参考文献,下载原文获取全部文献信息。- A sentence-level text adversarial attack algorithm against IIoT based smart grid
- (2021) Jialiang Dong et al. Computer Networks
- Toward a blockchain-based framework for challenge-based collaborative intrusion detection
- (2020) Wenjuan Li et al. International Journal of Information Security
- Detection of algorithmically-generated domains: An adversarial machine learning approach
- (2020) Mohammadhadi Alaeiyan et al. COMPUTER COMMUNICATIONS
- An adversarial attack on DNN-based black-box object detectors
- (2020) Yajie Wang et al. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS
- Defending network intrusion detection systems against adversarial evasion attacks
- (2020) Marek Pawlicki et al. Future Generation Computer Systems-The International Journal of eScience
- Blockchain-based authentication and authorization for smart city applications
- (2020) Christian Esposito et al. INFORMATION PROCESSING & MANAGEMENT
- Review of Artificial Intelligence Adversarial Attack and Defense Technologies
- (2019) Shilin Qiu et al. Applied Sciences-Basel
- Neural malware analysis with attention mechanism
- (2019) Hiromu Yakura et al. COMPUTERS & SECURITY
- One Pixel Attack for Fooling Deep Neural Networks
- (2019) Jiawei Su et al. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
- Secure and Efficient Vehicle-to-Grid Energy Trading in Cyber Physical Systems: Integration of Blockchain and Edge Computing
- (2019) Zhenyu Zhou et al. IEEE Transactions on Systems Man Cybernetics-Systems
- Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks
- (2018) Ding Wang et al. IEEE Transactions on Industrial Informatics
- A novel CNN based security guaranteed image watermarking generation scenario for smart city applications
- (2018) Daming Li et al. INFORMATION SCIENCES
- Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning
- (2018) Battista Biggio et al. PATTERN RECOGNITION
- Detecting Malware with an Ensemble Method Based on Deep Neural Network
- (2018) Jinpei Yan et al. Security and Communication Networks
- A Robust Mutual Authentication Scheme Based on Elliptic Curve Cryptography for Telecare Medical Information Systems
- (2018) Shuming Qiu et al. IEEE Access
- Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
- (2018) Naveed Akhtar et al. IEEE Access
- When Intrusion Detection Meets Blockchain Technology: A Review
- (2018) Weizhi Meng et al. IEEE Access
- Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound
- (2016) Ding Wang et al. IEEE Transactions on Dependable and Secure Computing
- Differential Evolution: A Survey of the State-of-the-Art
- (2010) Swagatam Das et al. IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION
Find Funding. Review Successful Grants.
Explore over 25,000 new funding opportunities and over 6,000,000 successful grants.
ExploreCreate your own webinar
Interested in hosting your own webinar? Check the schedule and propose your idea to the Peeref Content Team.
Create Now