top of page

Hacking Risks

White Background

Kong, Z., Xue, J., Wang, Y., Huang, L., Niu, Z., & Li, F. (2021). A survey on adversarial attack in the age of artificial intelligence. Wireless Communications and Mobile Computing, 2021. https://doi.org/10.1155/2021/4907754

Kwon, H., & Lee, J. (2021). Diversity adversarial training against adversarial attack on deep neural networks. Symmetry, 13(3). https://doi.org/10.3390/sym13030428

Park, S., & So, J. (2020). On the effectiveness of adversarial training in defending against adversarial example attacks for image classification. Applied Sciences (Switzerland), 10(22), 1–16. https://doi.org/10.3390/app10228079

Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2016). Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. Proceedings of the ACM Conference on Computer and Communications Security, 2016, 1528–1540. https://doi.org/10.1145/2976749.2978392

Xu, H., Ma, Y., Liu, H. C., Deb, D., Liu, H., Tang, J. L., & Jain, A. K. (2020). Adversarial attacks and defenses in images, graphs and text: A review. International Journal of Automation and Computing, 17(2), 151–178. https://doi.org/10.1007/s11633-019-1211-x

bottom of page