The following publications are possibly variants of this publication:
- Defending against FakeBob Adversarial Attacks in Speaker Verification Systems with Noise-AddingZesheng Chen, Li-Chi Chang, Chao Chen 0001, Guoping Wang, Zhuming Bi. algorithms, 15(8):293, 2022. [doi]
- An Adversarial DBN-LSTM Method for Detecting and Defending against DDoS Attacks in SDN EnvironmentsLei Chen, ZhiHao Wang, Ru Huo, Tao Huang 0005. algorithms, 16(4):197, April 2023. [doi]
- A Momentum-Based Local Face Adversarial Example Generation AlgorithmDapeng Lang, Deyun Chen, Jinjie Huang, Sizhao Li. algorithms, 15(12):465, 2022. [doi]
- An Image Hashing Algorithm for Authentication with Multi-Attack Reference Generation and Adaptive ThresholdingLing Du, Zehong He, Yijing Wang, Xiaochao Wang, Anthony T. S. Ho. algorithms, 13(9):227, 2020. [doi]