top of page

Yap Yu Heng

White Background

Cross, C., Parker, M., & Sansom, D. (2019). Media discourses surrounding ‘non-ideal’ victims: The case of the Ashley Madison data breach. International Review of Victimology, 25(1), 53–69. https://doi.org/10.1177/0269758017752410

Kong, Z., Xue, J., Wang, Y., Huang, L., Niu, Z., & Li, F. (2021). A survey on adversarial attack in the age of artificial intelligence. Wireless Communications and Mobile Computing, 2021. https://doi.org/10.1155/2021/4907754

Sharif, M., Bhagavatula, S., Bauer, L., & Reiter, M. K. (2016). Accessorize to a crime: Real and stealthy attacks on state-of-the-art face recognition. Proceedings of the ACM Conference on Computer and Communications Security, 2016, 1528–1540. https://doi.org/10.1145/2976749.2978392

Xu, H., Ma, Y., Liu, H. C., Deb, D., Liu, H., Tang, J. L., & Jain, A. K. (2020). Adversarial attacks and defenses in images, graphs and text: A review. International Journal of Automation and Computing, 17(2), 151–178. https://doi.org/10.1007/s11633-019-1211-x

bottom of page