The following publications are possibly variants of this publication:
- Visual privacy attacks and defenses in deep learning: a surveyGuangsheng Zhang, Bo Liu 0001, Tianqing Zhu, Andi Zhou, Wanlei Zhou 0001. air, 55(6):4347-4401, 2022. [doi]
- Adversarial Deep Learning for Cognitive Radio Security: Jamming Attack and Defense StrategiesYi Shi 0001, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Zhuo Lu, Jason H. Li. icc 2018: 1-6 [doi]
- Adversarial Examples: Attacks and Defenses for Deep LearningXiaoyong Yuan, Pan He, Qile Zhu, Xiaolin Li 0001. tnn, 30(9):2805-2824, 2019. [doi]
- Deep Learning Defense Method Against Adversarial AttacksLing Wang, Cheng Zhang, Jie Liu. SMC 2020: 3667-3672 [doi]
- Deep Learning-Guided Jamming for Cross-Technology Wireless Networks: Attack and DefenseDianqi Han, Ang Li, Lili Zhang, Yan Zhang, Jiawei Li, Tao Li, Ting Zhu, Yanchao Zhang. ton, 29(5):1922-1932, 2021. [doi]
- Deep reinforcement learning-based air combat maneuver decision-making: literature review, implementation tutorial and future directionXinwei Wang, Yihui Wang, Xichao Su, Lei Wang 0035, Chen Lu 0001, Haijun Peng, Jie Liu. air, 57(1):1, January 2024. [doi]
- Gradient leakage attacks in federated learningHaimei Gong, Liangjun Jiang, Xiaoyang Liu, Yuanqi Wang, Omary Gastro, Lei Wang, Ke Zhang, Zhen Guo. air, 56(S1):1337-1374, October 2023. [doi]