Related references
Note: Only part of the references are listed.Understanding adversarial attacks on deep learning based medical image analysis systems
Xingjun Ma et al.
PATTERN RECOGNITION (2021)
Detecting Localized Adversarial Examples: A Generic Approach using Critical Region Analysis
Fengting Li et al.
IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2021) (2021)
Robustness to adversarial examples can be improved with overfitting
Oscar Deniz et al.
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS (2020)
Principal Component Adversarial Example
Yonggang Zhang et al.
IEEE TRANSACTIONS ON IMAGE PROCESSING (2020)
One Pixel Attack for Fooling Deep Neural Networks
Jiawei Su et al.
IEEE TRANSACTIONS ON EVOLUTIONARY COMPUTATION (2019)
Universal Adversarial Perturbation via Prior Driven Uncertainty Approximation
Hong Liu et al.
2019 IEEE/CVF INTERNATIONAL CONFERENCE ON COMPUTER VISION (ICCV 2019) (2019)
Threat of Adversarial Attacks on Deep Learning in Computer Vision: A Survey
Naveed Akhtar et al.
IEEE ACCESS (2018)
Correction of AI systems by linear discriminants: Probabilistic foundations
A. N. Gorban et al.
INFORMATION SCIENCES (2018)
Towards Evaluating the Robustness of Neural Networks
Nicholas Carlini et al.
2017 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2017)
A Unified Gradient Regularization Family for Adversarial Examples
Chunchuan Lyu et al.
2015 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM) (2015)
Aleatory or epistemic? Does it matter?
Armen Der Kiureghian et al.
STRUCTURAL SAFETY (2009)
Calibrating noise to sensitivity in private data analysis
Cynthia Dwork et al.
THEORY OF CRYPTOGRAPHY, PROCEEDINGS (2006)
Additive logistic regression: A statistical view of boosting
J Friedman et al.
ANNALS OF STATISTICS (2000)