An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments
| dc.contributor.author | Wang, Weizheng | |
| dc.contributor.author | Wang, Xiangqi | |
| dc.contributor.author | Pan, Xianmin | |
| dc.contributor.author | Gong, Xingxing | |
| dc.contributor.author | Liang, Jian | |
| dc.contributor.author | Sharma, Pradip Kumar | |
| dc.contributor.author | Alfarraj, Osama | |
| dc.contributor.author | Said, Wael | |
| dc.contributor.institution | University of Aberdeen.Computing Science | en |
| dc.contributor.institution | University of Aberdeen.Cybersecurity and Privacy | en |
| dc.date.accessioned | 2023-12-01T14:18:00Z | |
| dc.date.available | 2023-12-01T14:18:00Z | |
| dc.date.issued | 2023-10-08 | |
| dc.description | Funding Information: Funding Statement: This work was supported in part by the Natural Science Foundation of Hunan Province under Grant Nos. 2023JJ30316 and 2022JJ2029, in part by a project supported by Scientific Research Fund of Hunan Provincial Education Department under Grant No. 22A0686, and in part by the National Natural Science Foundation of China under Grant No. 62172058. This work was also funded by the Researchers Supporting Project (No. RSP2023R102) King Saud University, Riyadh, Saudi Arabia. | en |
| dc.description.status | Peer reviewed | en |
| dc.format.extent | 18 | |
| dc.format.extent | 1630067 | |
| dc.identifier | 282143777 | |
| dc.identifier | 8aecdf65-49fb-4ce9-bbdc-85cccd2bac55 | |
| dc.identifier | 85174393829 | |
| dc.identifier.citation | Wang, W, Wang, X, Pan, X, Gong, X, Liang, J, Sharma, P K, Alfarraj, O & Said, W 2023, 'An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments', Computers, Materials and Continua, vol. 76, no. 3, pp. 3859-3876. https://doi.org/10.32604/cmc.2023.041346 | en |
| dc.identifier.doi | 10.32604/cmc.2023.041346 | |
| dc.identifier.iss | 3 | en |
| dc.identifier.issn | 1546-2218 | |
| dc.identifier.other | ORCID: /0000-0001-6620-9083/work/148048291 | |
| dc.identifier.uri | https://hdl.handle.net/2164/22320 | |
| dc.identifier.url | http://www.scopus.com/inward/record.url?scp=85174393829&partnerID=8YFLogxK | en |
| dc.identifier.vol | 76 | en |
| dc.language.iso | eng | |
| dc.relation.ispartof | Computers, Materials and Continua | en |
| dc.subject | adversarial attack | en |
| dc.subject | adversarial example | en |
| dc.subject | adversarial example detection | en |
| dc.subject | Deep neural networks | en |
| dc.subject | image denoising | en |
| dc.subject | machine learning | en |
| dc.subject | QA76 Computer software | en |
| dc.subject | Biomaterials | en |
| dc.subject | Modelling and Simulation | en |
| dc.subject | Mechanics of Materials | en |
| dc.subject | Computer Science Applications | en |
| dc.subject | Electrical and Electronic Engineering | en |
| dc.subject.lcc | QA76 | en |
| dc.title | An Intelligent Secure Adversarial Examples Detection Scheme in Heterogeneous Complex Environments | en |
| dc.type | Journal article | en |
Files
Original bundle
1 - 1 of 1
- Name:
- Wang_etal_CMC_An_Intelligent_Secure_VOR.pdf
- Size:
- 1.55 MB
- Format:
- Adobe Portable Document Format
