NatureMobile applications for skin cancer detection are vulnerable to physical camera-based adversarial attacks | Scientific ReportsMay 24By Kazuhiro TakemotoMore
Security Info WatchThe Rise of Adversarial AI in Cybersecurity: A Hidden ThreatMay 23By Isla SibandaMore
NatureEfficient black-box attack with surrogate models and multiple universal adversarial perturbations | Scientific ReportsMay 19More
Industrial CyberBuilding cyber-resilient manufacturing ecosystem amid rising adversarial attacks, supply chain constraints, talent gapMay 4By Paul Veeneman & Ron BrashMore
Tech XploreWavelet-based adversarial training: Cybersecurity system protects medical digital twins from attacksApr 10More
NatureA multi-layered defense against adversarial attacks in brain tumor classification using ensemble adversarial training and feature squeezing | Scientific ReportsMay 14By Ahmeed A. Yinusa & Misa FaezipourMore
Biometric UpdateIJCBās facial recognition adversarial attack challenge kicks offMar 17By Masha BorakMore
NatureChinese medical named entity recognition integrating adversarial training and feature enhancement | Scientific ReportsApr 28By Shen-Yi Guo, Wanqin Wang & Xu ZhangMore
MarkTechPostTransformer-Based Modulation Recognition: A New Defense Against Adversarial AttacksFeb 2By Mahmoud GhorbelMore
NatureAn enhanced ensemble defense framework for boosting adversarial robustness of intrusion detection systems | Scientific ReportsApr 23More
Hunton Andrews Kurth LLPNIST Finalizes Cyber Attack Guidance for Adversarial Machine LearningApr 3More
TechTalksAdversarial pop-ups trick AI agents into clicking malicious linksNov 10, 2024By Ben DicksonMore
MarkTechPostThis AI Paper Propsoes an AI Framework to Prevent Adversarial Attacks on Mobile Vehicle-to-Microgrid ServicesOct 17, 2024By Mahmoud GhorbelMore
NatureA fault diagnosis method for rolling bearings in open-set domain adaptation with adversarial learning | Scientific ReportsMar 28By Bing Keong Li, Feng Pan & Xuming HeMore
Wiley Online LibraryQuantum Transfer Learning with Adversarial Robustness for Classification of HighāResolution Image DatasetsSep 22, 2024More
VentureBeatDefending SOCs Under Siege: Battling Adversarial AI AttacksDec 9, 2024By Louis ColumbusMore
MarkTechPostAnalysis of Deceptive Data Attacks with Adversarial Machine Learning for Solar Photovoltaic Power Generation ForecastingOct 16, 2024By Mahmoud GhorbelMore
Wiley Online LibraryCrossāSpecies Prediction of Transcription Factor Binding by Adversarial Training of a Novel NucleotideāLevel Deep Neural NetworkJul 30, 2024More
FrontiersNeural architecture search for adversarial robustness via learnable pruningSep 15, 2024By Ruyi Ding, Pu Zhao & Xue LinMore
CrowdStrikeHow CrowdStrike Boosts Machine Learning Efficacy Against Adversarial SamplesMay 9, 2023More
NatureDefending against and generating adversarial examples together with generative adversarial networks | Scientific ReportsApr 15By Ying Wang, Yang Yang & Wei CuiMore
MarkTechPostAdvDGMs: Enhancing Adversarial Robustness in Tabular Machine Learning by Incorporating Constraint Repair Layers for Realistic and Domain-Specific Attack GenerationSep 25, 2024By Asif RazzaqMore
Wiley Online LibraryEvasion Attacks on Deep LearningāBased Helicopter Recognition SystemsMar 22, 2024More
FrontiersFeature separation and adversarial training for the patient-independent detection of epileptic seizuresJul 18, 2023By Han Wen, Dong Huang & Yong Ryoul YangMore
VentureBeatAdversarial attacks on AI models are rising: what should you do now?Sep 20, 2024By Louis ColumbusMore
MarkTechPostThis AI Paper from the National University of Singapore Introduces a Defense Against Adversarial Attacks on LLMs Utilizing Self-EvaluationJul 10, 2024By Mohammad AsjadMore
FrontiersLeveraging linear mapping for model-agnostic adversarial defenseOct 29, 2023By Nathaniel Blanchard, Huma Jamil & Yajing LiuMore
NatureHard label adversarial attack with high query efficiency against NLP models | Scientific ReportsMar 18By Shilin Qiu, Zhewei Wu & Qihe LiuMore
FrontiersConvolutional autoencoder joint boundary and mask adversarial learning for fundus image segmentationDec 5, 2022By Chengrui Wang, Xu Zhang & Jiaqi SongMore
Wiley Online LibraryAdversarial Attacks on Large Language ModelāBased System and Mitigating Strategies: A Case Study on ChatGPTJun 10, 2023More
FrontiersPatient-specific approach using data fusion and adversarial training for epileptic seizure predictionMay 3, 2023By Han Wen, Yong Ryoul Yang & Xiaoguang LinMore
NatureGEAAD: generating evasive adversarial attacks against android malware defense | Scientific ReportsApr 7By Hassan Jalil HadiMore
NatureMitigating opinion polarization in social networks using adversarial attacks | Scientific ReportsMar 16By Genki Ichinose & Kazuhiro TakemotoMore
NatureBoosting adversarial transferability in vision-language models via multimodal feature heterogeneity | Scientific ReportsMar 2More
NatureDiagnostic behavior analysis of profuse data intrusions in cyber physical systems using adversarial learning techniques | Scientific ReportsMar 1By Alaa O. Khadidos, Shitharth Selvarajan & Mueen UddinMore
NatureThe inherent adversarial robustness of analog in-memory computingFeb 19By Julian Buchel, Manuel Le Gallo & Abu SebastianMore
NatureUniversal attention guided adversarial defense using feature pyramid and non-local mechanisms | Scientific ReportsFeb 12By Siqi Gu, Yuning Zhang & Lizhe XieMore
NatureDual-Targeted adversarial example in evasion attack on graph neural networksJan 31By Hyun Kwon & Dae-Jin KimMore
NaturePolarimetric image recovery method with domain-adversarial learning for underwater imaging | Scientific ReportsJan 31By Fei Tian & Tao WeiMore
NatureA two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security | Scientific ReportsJan 17By Faten Karim, E. Laxmi Lydia & Mohamad Khairi IshakMore
NatureCross-domain lung opacity detection via adversarial learning and box fusionDec 28By Zhilin Guo, Wei Yu & Xin ZhangMore
NatureTransfer learning enabled transformer-based generative adversarial networks for modeling and generating terahertz channels | Communications EngineeringNov 2, 2024By Zhengdong Hu, Yuanbo Li & Chong HanMore