default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 187 matches
- 2025
- Chenyu Zhang, Mingwang Hu, Wenhui Li, Lanjun Wang:
Adversarial attacks and defenses on text-to-image diffusion models: A survey. Inf. Fusion 114: 102701 (2025) - 2024
- Jinyin Chen, Ximin Zhang, Haibin Zheng:
Attacks, Defenses and Testing for Deep Learning. Springer 2024, ISBN 978-981-97-0424-8, pp. 5-399 - Conrado P. Vizcarra, Shadan Alhamed, Abdulelah Abdallah Algosaibi, Mohammed Alnaeem, Adel Aldalbahi, Nura Aljaafari, Ahmad Sawalmeh, Mahmoud Nazzal, Abdallah Khreishah, Abdulaziz Alhumam, Muhammad Anan:
Deep learning adversarial attacks and defenses on license plate recognition system. Clust. Comput. 27(8): 11627-11644 (2024) - Daichong Chao, Dawei Xu, Feng Gao, Chuan Zhang, Weiting Zhang, Liehuang Zhu:
A Systematic Survey on Security in Anonymity Networks: Vulnerabilities, Attacks, Defenses, and Formalization. IEEE Commun. Surv. Tutorials 26(3): 1775-1829 (2024) - Huajie Chen, Chi Liu, Tianqing Zhu, Wanlei Zhou:
When deep learning meets watermarking: A survey of application, attacks and defenses. Comput. Stand. Interfaces 89: 103830 (2024) - Mayra Alexandra Macas Carrasco, Chun-Ming Wu, Walter Fuertes:
Adversarial examples: A survey of attacks and defenses in deep learning-enabled cybersecurity systems. Expert Syst. Appl. 238(Part E): 122223 (2024) - Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez:
Adversarial attacks and defenses on ML- and hardware-based IoT device fingerprinting and identification. Future Gener. Comput. Syst. 152: 30-42 (2024) - Zesheng Chen, Jack Li, Chao Chen:
Ensemble Adversarial Defenses and Attacks in Speaker Verification Systems. IEEE Internet Things J. 11(20): 32645-32655 (2024) - Bui Duc Son, Tien Hoa Nguyen, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi, Mérouane Debbah:
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems. IEEE Internet Things J. 11(11): 19168-19187 (2024) - David Hasselquist, Ethan Witwer, August Carlson, Niklas Johansson, Niklas Carlsson:
Raising the Bar: Improved Fingerprinting Attacks and Defenses for Video Streaming Traffic. Proc. Priv. Enhancing Technol. 2024(4): 167-184 (2024) - Zhirun Zheng, Zhetao Li, Cheng Huang, Saiqin Long, Mushu Li, Xuemin Shen:
Data Poisoning Attacks and Defenses to LDP-Based Privacy-Preserving Crowdsensing. IEEE Trans. Dependable Secur. Comput. 21(5): 4861-4878 (2024) - Chuang Wang, Zidong Wang, Qinyuan Liu, Hongli Dong, Weiguo Sheng:
Support-Sample-Assisted Domain Generalization via Attacks and Defenses: Concepts, Algorithms, and Applications to Pipeline Fault Diagnosis. IEEE Trans. Ind. Informatics 20(4): 6413-6423 (2024) - Lingjuan Lyu, Han Yu, Xingjun Ma, Chen Chen, Lichao Sun, Jun Zhao, Qiang Yang, Philip S. Yu:
Privacy and Robustness in Federated Learning: Attacks and Defenses. IEEE Trans. Neural Networks Learn. Syst. 35(7): 8726-8746 (2024) - Sihan Wang, Tian Xie, Min-Yue Chen, Guan-Hua Tu, Chi-Yu Li, Xinyu Lei, Po-Yi Chou, Fu-Cheng Hsieh, Yiwen Hu, Li Xiao, Chunyi Peng:
Dissecting Operational Cellular IoT Service Security: Attacks and Defenses. IEEE/ACM Trans. Netw. 32(2): 1229-1244 (2024) - Miguel Costa, Sandro Pinto:
David and Goliath: An Empirical Evaluation of Attacks and Defenses for QNNs at the Deep Edge. EuroS&P 2024: 524-541 - Giulio Rossolini, Alessandro Biondi, Giorgio C. Buttazzo:
Attention-Based Real-Time Defenses for Physical Adversarial Attacks in Vision Applications. ICCPS 2024: 23-32 - Shenghui Li, Edith C. H. Ngai, Fanghua Ye, Li Ju, Tianru Zhang, Thiemo Voigt:
Blades: A Unified Benchmark Suite for Byzantine Attacks and Defenses in Federated Learning. IoTDI 2024: 158-169 - Shanshan Han, Baturalp Buyukates, Zijian Hu, Han Jin, Weizhao Jin, Lichao Sun, Xiaoyang Wang, Wenxuan Wu, Chulin Xie, Yuhang Yao, Kai Zhang, Qifan Zhang, Yuhui Zhang, Carlee Joe-Wong, Salman Avestimehr, Chaoyang He:
FedSecurity: A Benchmark for Attacks and Defenses in Federated Learning and Federated LLMs. KDD 2024: 5070-5081 - Zhichen Dong, Zhanhui Zhou, Chao Yang, Jing Shao, Yu Qiao:
Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey. NAACL-HLT 2024: 6734-6747 - Firuz Juraev, Mohammed Abuhamad, Eric Chan-Tin, George K. Thiruvathukal, Tamer Abuhmed:
Unmasking the Vulnerabilities of Deep Learning Models: A Multi-Dimensional Analysis of Adversarial Attacks and Defenses. SVCC 2024: 1-8 - Arka Rai Choudhuri, Sanjam Garg, Julien Piet, Guru-Vamsi Policharla:
Mempool Privacy via Batched Threshold Encryption: Attacks and Defenses. USENIX Security Symposium 2024 - Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. WISEC 2024: 237-247 - Eleonora Losiouk, Alessandro Brighente, Mauro Conti, Yousra Aafer, Yanick Fratantonio:
The 27th International Symposium on Research in Attacks, Intrusions and Defenses, RAID 2024, Padua, Italy, 30 September 2024- 2 October 2024. ACM 2024, ISBN 979-8-4007-0959-3 [contents] - Bui Duc Son, Tien Hoa Nguyen, Trinh Van Chien, Waqas Khalid, Mohamed Amine Ferrag, Wan Choi, Mérouane Debbah:
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems. CoRR abs/2401.14780 (2024) - Lei Xu, Sarah Alnegheimish, Laure Berti-Équille, Alfredo Cuesta-Infante, Kalyan Veeramachaneni:
Single Word Change is All You Need: Designing Attacks and Defenses for Text Classifiers. CoRR abs/2401.17196 (2024) - Hao Fang, Yixiang Qiu, Hongyao Yu, Wenbo Yu, Jiawei Kong, Baoli Chong, Bin Chen, Xuan Wang, Shu-Tao Xia:
Privacy Leakage on DNNs: A Survey of Model Inversion Attacks and Defenses. CoRR abs/2402.04013 (2024) - Azuka J. Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah:
System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks. CoRR abs/2402.06846 (2024) - Zhichen Dong, Zhanhui Zhou, Chao Yang, Jing Shao, Yu Qiao:
Attacks, Defenses and Evaluations for LLM Conversation Safety: A Survey. CoRR abs/2402.09283 (2024) - Arijit Ghosh Chowdhury, Md Mofijul Islam, Vaibhav Kumar, Faysal Hossain Shezan, Vaibhav Kumar, Vinija Jain, Aman Chadha:
Breaking Down the Defenses: A Comparative Survey of Attacks on Large Language Models. CoRR abs/2403.04786 (2024) - Ziyao Liu, Huanyi Ye, Chen Chen, Kwok-Yan Lam:
Threats, Attacks, and Defenses in Machine Unlearning: A Survey. CoRR abs/2403.13682 (2024)
skipping 157 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-11-09 00:42 CET from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint