Basic Search / Search Result

  • Search Result: 3results Search Strategy: "Department of Computer Science and Information Engineering".edept (Phrase) and ekeyword.raw="Adversarial example"


  • Refine the results: Search Expand the trend chart of search results

  • Individualized services

    My Search Strategy

  • Sort:

      
  • Selected0results


      Select all on this page

    1

    Robustness Evaluation of Graph-based Malware Detection Using Code-level Adversarial Attack with Explainability

    2

    Detecting Geometric Transformation-based Adversarial Attack using Adversarial Matching Analysis

    3

    Protecting Copyrighted Images from Diffusion Models Using Adversarial Examples with Hybrid Loss and Momentum
    1