


default search action
"Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal ..."
Zhe Zhao et al. (2024)
- Zhe Zhao
, Guangke Chen
, Tong Liu
, Taishan Li
, Fu Song
, Jingyi Wang
, Jun Sun
:
Attack as Detection: Using Adversarial Attack Methods to Detect Abnormal Examples. ACM Trans. Softw. Eng. Methodol. 33(3): 68:1-68:45 (2024)

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.