UM

Browse/Search Results:  1-2 of 2 Help

Selected(0)Clear Items/Page:    Sort:
Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain Conference paper
Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan. Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain[C]:Association for the Advancement of Artificial Intelligence, 2021, 9877-9885.
Authors:  Jinyu Tian;  Jiantao Zhou;  Yuanman Li;  Jia Duan
Adobe PDF | Favorite | TC[WOS]:24 TC[Scopus]:37 | Submit date:2022/07/07
Defending against Contagious Attacks on a Network with Resource Reallocation Conference paper
Rufan Bai, Haoxing Lin, Xinyu Yang, Xiaowei Wu, Minming Li, Weijia Jia. Defending against Contagious Attacks on a Network with Resource Reallocation[C], 2021, 5135 - 5142.
Authors:  Rufan Bai;  Haoxing Lin;  Xinyu Yang;  Xiaowei Wu;  Minming Li; et al.
Favorite | TC[WOS]:2 TC[Scopus]:3 | Submit date:2022/07/09
Network Defending Game  Contagious Attack