Deep search:Searching for "Adversarial attacks" in 'KEYWORD Got 4 items.
index Title
1Towards sustainable adversarial training with successive perturbation generation
Author(s):Wei LIN, Lichuan LIAO  Clicked:3563  Download:2628  Cited:0  <Full Text>  <PPT> 880
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.4 P.527-539  DOI:10.1631/FITEE.2300474
2TendiffPure: a convolutional tensor-train denoising diffusion model for purification
Author(s):Mingyuan BAI, Derun ZHOU, Qibin ZHAO  Clicked:2863  Download:2474  Cited:0  <Full Text>  <PPT> 1470
Frontiers of Information Technology & Electronic Engineering  2024 Vol.25 No.1 P.160-169  DOI:10.1631/FITEE.2300392
3A comprehensive survey of physical adversarial vulnerabilities in autonomous driving systems
Author(s):Shuai ZHAO, Boyuan ZHANG, Yucheng ...  Clicked:2415  Download:3222  Cited:0  <Full Text>  <PPT> 617
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.4 P.510-533  DOI:10.1631/FITEE.2300867
4Black-box adversarial attacks on deep reinforcement learning-based proportional–integral–deri...
Author(s):Wei WANG, Zhenyong ZHANG, Xin WANG...  Clicked:929  Download:447  Cited:0  <Full Text>  <PPT> 40
Frontiers of Information Technology & Electronic Engineering  2025 Vol.26 No.11 P.2128-2142  DOI:10.1631/FITEE.2401021
Journal of Zhejiang University-SCIENCE, 38 Zheda Road, Hangzhou 310027, China
Tel: +86-571-87952783; E-mail: cjzhang@zju.edu.cn
Copyright © 2000 - 2026 Journal of Zhejiang University-SCIENCE