Deep search:Searching for "adversarial attacks" in 'ABSTRACTGot 4 items.
index Title
1Towards sustainable adversarial training with successive perturbation generation
Author(s):Wei LIN, Lichuan LIAO  Clicked:3562  Download:2620  Cited:0  <Full Text>  <PPT> 872
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.4 P.527-539  DOI:10.1631/FITEE.2300474
2TendiffPure: a convolutional tensor-train denoising diffusion model for purification
Author(s):Mingyuan BAI, Derun ZHOU, Qibin ZHAO  Clicked:2860  Download:2472  Cited:0  <Full Text>  <PPT> 1469
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.1 P.160-169  DOI:10.1631/FITEE.2300392
3A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng ...  Clicked:2413  Download:3215  Cited:0  <Full Text>  <PPT> 616
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
4Black-box adversarial attacks on deep reinforcement learning-based proportional–integral–deri...
Author(s):Wei WANG, Zhenyong ZHANG, Xin WANG...  Clicked:925  Download:446  Cited:0  <Full Text>  <PPT> 37
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.11 P.2128-2142  DOI:10.1631/FITEE.2401021
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE