Backdoor (Trojan) attacks represent a significant adversarial threat to deep neural networks (DNNs). In such attacks, the presence of an attacker's backdoor trigger causes a test …
H Zhang, R Yang, W He, Z Feng - Information Sciences, 2024 - Elsevier
By dint of the advantage of deeply integrating empirical knowledge and monitoring data, the belief rule base (BRB) is widely used to assess the performance of complex systems …
A Verma, AV Subramanyam, S Bangar, N Lal… - arXiv preprint arXiv …, 2023 - arxiv.org
Certified defense methods against adversarial perturbations have been recently investigated in the black-box setting with a zeroth-order (ZO) perspective. However, these …
Y Liu, C Li, Z Wang, H Wu, X Zhang - Information Sciences, 2024 - Elsevier
Recently, transferable adversarial attacks on deep neural networks (DNNs) have attracted significant attention. Although existing adversarial attacks have achieved high attack …
Generative modeling and adversarial learning have significantly advanced the field of computer vision, particularly in object recognition and synthesis, unsupervised domain …