Adversarial Example Attacks in the Physical World

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:ML4CS (3. : 2020 : Kanton, Stadt) Machine learning for cyber security ; Part 2
1. Verfasser: Ren, Huali (VerfasserIn)
Weitere Verfasser: Huang, Teng (VerfasserIn)
Pages:2
Format: UnknownFormat
Sprache:eng
Veröffentlicht: 2020
Schlagworte:
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Titel Jahr Verfasser
Network Adjacency Condition for Fractional (g, f, n', m)-Critical 2020 Pan, Yu
An Effective Remote Data Disaster Recovery Plan for the Space TT&C System 2020 Han, Weijie
An Information and Power Simultaneous Transfer Strategy in UAV and Wireless Rechargeable Sensor Networks 2020 Li, Zhi
Research on Adaptive Beacon Transmitting Power Based on Vehicle Forecast Error 2020 Wang, Meng
Analysis of the Effective Scatters for Hyperloop Wireless Communications Using the Geometry-Based Model 2020 Zhang, Jiachi
Research on High Reliable Wireless Channel Data Cleaning Method 2020 Zhuang, Lingfan
An Adaptive Data Protection Scheme for Optimizing Storage Space 2020 Ming, Meng
A Novel Method to Classify Videos Based VBR Trace 2020 Yu, Xiaojie
Estimation of Motor Imagination Based on Consumer-Grade EEG Device 2020 Luo, Zhenzhen
Q-Learning-Based Adaptive Bacterial Foraging Optimization 2020 Niu, Ben
Firefly Algorithm Based on Dynamic Step Change Strategy 2020 Wang, Jing
Earthquakes Detection Scheme by Dynamic Time Warping on Smartphones 2020 Zhu, Yuqin
Towards Accurate Seismic Events Detection Using Motion Sensors on Smartphones 2020 Cao, Qingping
Multi-term Multi-task Allocation for Mobile Crowdsensing with Weighted Max-Min Fairness 2020 Liu, Haibo
Analysis of the Influence of Stylized-CIFAR10 Dataset on ResNet 2020 Wu, Dexin
Application of Fuzzy Comprehensive Evaluation in Environmental Adaptability of Poultry House 2020 Zhang, Fenghang
Squeeze Criterion GANs: Double Adversarial Learning Method 2020 Gan, Yan
A Feature-Based Detection System of Adversarial Sample Attack 2020 Wang, Fangwei
Querying Little Is Enough: Model Inversion Attack via Latent Information 2020 Mo, Kanghua
Efficient Defense Against Adversarial Attacks and Security Evaluation of Deep Leaming System 2020 Pang, Na
Alle Artikel auflisten