共 50 条
- [41] Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
- [42] Detection Based Defense Against Adversarial Examples From the Steganalysis Point of View 2019 IEEE/CVF CONFERENCE ON COMPUTER VISION AND PATTERN RECOGNITION (CVPR 2019), 2019, : 4820 - 4829
- [43] On the Limitation of MagNet Defense against L1-based Adversarial Examples 2018 48TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W), 2018, : 200 - 214
- [45] WFGUARD: an Effective Fuzzing-testing-based Traffic Morphing Defense against Website Fingerprinting IEEE INFOCOM 2024-IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, 2024, : 441 - 450
- [47] Attack as Defense: Characterizing Adversarial Examples using Robustness ISSTA '21: PROCEEDINGS OF THE 30TH ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, 2021, : 42 - 55
- [48] Advocating for Multiple Defense Strategies Against Adversarial Examples ECML PKDD 2020 WORKSHOPS, 2020, 1323 : 165 - 177
- [49] AuxBlocks: Defense Adversarial Examples via Auxiliary Blocks 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2019,
- [50] Defense Against Adversarial Examples Using Beneficial Noise PROCEEDINGS OF 2022 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2022, : 1842 - 1848