Author of the publication

Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks.

, , , , and . ICIC (1), volume 14086 of Lecture Notes in Computer Science, page 442-453. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Kernel Optimization in SVM for Defense Against Adversarial Attacks., and . CSS, volume 12653 of Lecture Notes in Computer Science, page 32-42. Springer, (2020)A game-theoretic approach of mixing different qualities of coins., , , , , and . Int. J. Intell. Syst., 35 (12): 1899-1911 (2020)A Novel Pruning Method Based on Correlation Applied in Full-Connection Layer Neurons., , , , and . ICAIS (2), volume 13339 of Lecture Notes in Computer Science, page 205-215. Springer, (2022)Zeroth-Order Gradient Approximation Based DaST for Black-Box Adversarial Attacks., , , , and . ICIC (1), volume 14086 of Lecture Notes in Computer Science, page 442-453. Springer, (2023)Adaptive Threshold Learning in Frequency Domain for Classification of Breast Cancer Histopathological Images., , and . Int. J. Intell. Syst., (2024)DSCAE: a denoising sparse convolutional autoencoder defense against adversarial examples., , and . J. Ambient Intell. Humaniz. Comput., 13 (3): 1419-1429 (2022)Explanation-Guided Adversarial Example Attacks., , , , and . Big Data Res., (2024)Explanation-based data-free model extraction attacks., , , and . World Wide Web (WWW), 26 (5): 3081-3092 (September 2023)Detect Adversarial Examples by Using Feature Autoencoder., , , , and . ICAIS (3), volume 13340 of Lecture Notes in Computer Science, page 233-242. Springer, (2022)A Simple Kernel Method with Shannon Wavelet Kernel for Face Recognition., and . CSO (1), page 434-437. IEEE Computer Society, (2009)