Login / Signup
Detecting Adversarial Examples by Input Transformations, Defense Perturbations, and Voting.
Federico Nesti
Alessandro Biondi
Giorgio Carlo Buttazzo
Published in:
IEEE Trans. Neural Networks Learn. Syst. (2023)
Keyphrases
</>
intrusion detection
multi agent
input data
training examples
genetic algorithm
knowledge base
special case
automatic detection
computer virus