WeChat Mini Program
Old Version Features

An Efficient Preprocessing-based Approach to Mitigate Advanced Adversarial Attacks

IEEE TRANSACTIONS ON COMPUTERS(2024)

Cited 18|Views175
Key words
Perturbation methods,Training,Computational modeling,Robustness,Predictive models,Neural networks,Mathematical model,Adversarial examples,deep learning,adversarial attacks,BPDA
AI Read Science
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Chat Paper
Summary is being generated by the instructions you defined