Crossref Citations
This Book has been
cited by the following publications. This list is generated based on data provided by Crossref.
Sotgiu, Angelo
Demontis, Ambra
Melis, Marco
Biggio, Battista
Fumera, Giorgio
Feng, Xiaoyi
and
Roli, Fabio
2020.
Deep neural rejection against adversarial examples.
EURASIP Journal on Information Security,
Vol. 2020,
Issue. 1,
Redondo, Alberto
and
Insua, David Ríos
2020.
Protecting From Malware Obfuscation Attacks Through Adversarial Risk Analysis.
Risk Analysis,
Vol. 40,
Issue. 12,
p.
2598.
Berk, Richard A.
2020.
Statistical Learning from a Regression Perspective.
p.
361.
Brown, Brandon
Richardson, Alexicia
Smith, Marcellus
Dozier, Gerry
and
King, Michael C.
2020.
The Adversarial UFP/UFN Attack: A New Threat to ML-based Fake News Detection Systems?.
p.
1523.
Lee, Daniel
and
Verma, Rakesh
2020.
Adversarial Machine Learning for Text.
p.
33.
Roco, Mihail C.
2020.
Principles of convergence in nature and society and their application: from nanoscale, digits, and logic steps to global progress.
Journal of Nanoparticle Research,
Vol. 22,
Issue. 11,
Smith, Marcellus
Brown, Brandon
Dozier, Gerry
and
King, Michael
2021.
Mitigating Attacks on Fake News Detection Systems using Genetic-Based Adversarial Training.
p.
1265.
Fagioli, Simone
2021.
‘I’m your automatic colour’
La colorazione automatica delle immagini in antropologia
.
magazén,
Li, Tommy
and
Merkel, Cory
2021.
Artificial Neural Networks and Machine Learning – ICANN 2021.
Vol. 12891,
Issue. ,
p.
91.
Ranade, Priyanka
Piplai, Aritran
Mittal, Sudip
Joshi, Anupam
and
Finin, Tim
2021.
Generating Fake Cyber Threat Intelligence Using Transformer-Based Models.
p.
1.
Casula, Roberto
Orru, Giulia
Angioni, Daniele
Feng, Xiaoyi
Marcialis, Gian Luca
and
Roli, Fabio
2021.
Are spoofs from latent fingerprints a real threat for the best state-of-art liveness detectors?.
p.
3412.
April Pyone, Maung Maung
Kinoshita, Yuma
and
Kiya, Hitoshi
2022.
Frontiers in Fake Media Generation and Detection.
p.
45.
Furrer, Frank J.
2022.
Safety and Security of Cyber-Physical Systems.
p.
333.
Freiesleben, Timo
2022.
The Intriguing Relation Between Counterfactual Explanations and Adversarial Examples.
Minds and Machines,
Vol. 32,
Issue. 1,
p.
77.
Furrer, Frank J.
2022.
Safety and Security of Cyber-Physical Systems.
p.
263.
Rafiq, Fatima
Awan, Mazhar Javed
Yasin, Awais
Nobanee, Haitham
Zain, Azlan Mohd
and
Bahaj, Saeed Ali
2022.
Privacy Prevention of Big Data Applications: A Systematic Literature Review.
SAGE Open,
Vol. 12,
Issue. 2,
p.
215824402210964.