Deep search:Searching for "adversarial attack" in 'ABSTRACT Got 4 items.
index Title
1Towards sustainable adversarial training with successive perturbation generation
Author(s):Wei LIN, Lichuan LIAO  Clicked:3252  Download:2266  Cited:0  <Full Text>  <PPT> 760
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.4 P.527-539  DOI:10.1631/FITEE.2300474
2TendiffPure: a convolutional tensor-train denoising diffusion model for purification
Author(s):Mingyuan BAI, Derun ZHOU, Qibin ZHAO  Clicked:2550  Download:2202  Cited:0  <Full Text>  <PPT> 1356
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.1 P.160-169  DOI:10.1631/FITEE.2300392
3A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng ...  Clicked:2074  Download:2684  Cited:0  <Full Text>  <PPT> 492
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
4Black-box adversarial attack on deep reinforcement learning-based PID controller for load frequency control
Author(s):Wei WANG1, Zhenyong ZHA...  Clicked:408  Download:161  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2401021
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2025 Journal of Zhejiang University-SCIENCE