Deep search:Searching for "Adversarial attack" in 'KEYWORD Got 3 items.
index Title
1Towards sustainable adversarial training with successive perturbation generation
Author(s):Wei LIN, Lichuan LIAO  Clicked:985  Download:936  Cited:0  <Full Text>  <PPT> 278
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.4 P.527-539  DOI:10.1631/FITEE.2300474
2TendiffPure: a convolutional tensor-train denoising diffusion model for purification
Author(s):Mingyuan BAI, Derun ZHOU, Qibin ZHAO  Clicked:1090  Download:812  Cited:0  <Full Text>  <PPT> 266
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.1 P.160-169  DOI:10.1631/FITEE.2300392
3A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng ...  Clicked:756  Download:374  Cited:0  <Full Text>
Frontiers of Information Technology & Electronic Engineering  1998 Vol.-1 No.-1 P.  DOI:10.1631/FITEE.2300867
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2024 Journal of Zhejiang University-SCIENCE