Login / Signup

Detecting Adversarial Examples by Input Transformations, Defense Perturbations, and Voting.

Federico NestiAlessandro BiondiGiorgio Carlo Buttazzo
Published in: IEEE Trans. Neural Networks Learn. Syst. (2023)
Keyphrases
  • intrusion detection
  • multi agent
  • input data
  • training examples
  • genetic algorithm
  • knowledge base
  • special case
  • automatic detection
  • computer virus