Articles with "based defense" as a keyword



Photo by actuallyjoel from unsplash

Source-Based Defense Against DDoS Attacks in SDN Based on sFlow and SOM

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2021.3139511

Abstract: In the traditional distributed control network, due to the difficulty in detection and the ambiguous defense responsibility, it is not efficient and effective to detect Distributed Denial of Service (DDoS) attacks in the network where… read more here.

Keywords: defense; based defense; ddos attacks; source based ... See more keywords
Photo from wikipedia

ARGAN: Adversarially Robust Generative Adversarial Networks for Deep Neural Networks against Adversarial Examples

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3160283

Abstract: An adversarial example, which is an input instance with small, intentional feature perturbations to machine learning models, represents a concrete problem in Artificial intelligence safety. As an emerging defense method to defend against adversarial examples,… read more here.

Keywords: networks based; adversarial examples; based defense; adversarial networks ... See more keywords
Photo from wikipedia

Image Transformation-Based Defense Against Adversarial Perturbation on Deep Learning Models

Sign Up to like & get
recommendations!
Published in 2021 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2020.3027183

Abstract: Deep learning algorithms provide state-of-the-art results on a multitude of applications. However, it is also well established that they are highly vulnerable to adversarial perturbations. It is often believed that the solution to this vulnerability… read more here.

Keywords: image; based defense; deep learning; perturbation ... See more keywords