The following publications are possibly variants of this publication:
- Adversarial Attack and Defense on Deep Learning for Air Transportation Communication JammingMingqian Liu, Zhenju Zhang, Yunfei Chen 0001, Jianhua Ge, Nan Zhao 0001. tits, 25(1):973-986, January 2024. [doi]
- Adversarial Attacking and Defensing Modulation Recognition With Deep Learning in Cognitive-Radio-Enabled IoTZhenju Zhang, Linru Ma, Mingqian Liu, Yunfei Chen 0001, Nan Zhao 0001. iotj, 11(8):14949-14962, April 2024. [doi]
- Learning attack strategies through mining and correlation of security alarmsWang Li, Li Zhi-tang, Lei Jie. im 2007: 713-716 [doi]
- Adversarial Examples: Attacks and Defenses for Deep LearningXiaoyong Yuan, Pan He, Qile Zhu, Xiaolin Li 0001. tnn, 30(9):2805-2824, 2019. [doi]