Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey
Adversarial attacks and defenses in machine learning and deep neural network (DNN) have
been gaining significant attention due to the rapidly growing applications of deep learning in …
been gaining significant attention due to the rapidly growing applications of deep learning in …
Adversarial attacks and countermeasures on image classification-based deep learning models in autonomous driving systems: A systematic review
The rapid development of artificial intelligence (AI) and breakthroughs in Internet of Things
(IoT) technologies have driven the innovation of advanced autonomous driving systems …
(IoT) technologies have driven the innovation of advanced autonomous driving systems …
Feature aggregation network for small object detection
R **g, W Zhang, Y Li, W Li, Y Liu - Expert Systems with Applications, 2024 - Elsevier
Due to the miniature scale and limited identifiable features, small objects pose a significant
challenge in detection. Improving the accuracy of small object detection is a momentous …
challenge in detection. Improving the accuracy of small object detection is a momentous …
Revisiting class-incremental object detection: An efficient approach via intrinsic characteristics alignment and task decoupling
L Bai, H Song, T Feng, T Fu, Q Yu, J Yang - Expert Systems with …, 2024 - Elsevier
In real-world settings, object detectors frequently encounter continuously emerging object
instances from new classes. Incremental Object Detection (IOD) addresses this challenge by …
instances from new classes. Incremental Object Detection (IOD) addresses this challenge by …
[HTML][HTML] A review of cyber attacks on sensors and perception systems in autonomous vehicle
Vehicle automation has been in the works for a long time now. Automatic brakes, cruise
control, GPS satellite navigation, etc. are all common features seen in today's automobiles …
control, GPS satellite navigation, etc. are all common features seen in today's automobiles …
[HTML][HTML] A qualitative AI security risk assessment of autonomous vehicles
This paper systematically analyzes the security risks associated with artificial intelligence
(AI) components in autonomous vehicles (AVs). Given the increasing reliance on AI for …
(AI) components in autonomous vehicles (AVs). Given the increasing reliance on AI for …
Multi-source information fusion attention network for weakly supervised salient object detection in optical remote sensing images
L Yan, S Yang, Q Zhang, R Yan, T Wang, H Liu… - Expert Systems with …, 2025 - Elsevier
Due to the complex backgrounds and diverse attributes of salient objects in optical remote
sensing images (RSIs), existing methods heavily rely on pixel-level annotations, with sparse …
sensing images (RSIs), existing methods heavily rely on pixel-level annotations, with sparse …
Adversarial Attacks and Defenses in 6G Network-Assisted IoT Systems
The Internet of Things (IoT) and massive IoT systems are key to sixth-generation (6G)
networks due to dense connectivity, ultrareliability, low latency, and high throughput …
networks due to dense connectivity, ultrareliability, low latency, and high throughput …
Adv-BDPM: Adversarial attack based on Boundary Diffusion Probability Model
D Zhang, Y Dong - Neural Networks, 2023 - Elsevier
Deep neural networks have become increasingly significant in our daily lives due to their
remarkable performance. The issue of adversarial examples, which are responsible for the …
remarkable performance. The issue of adversarial examples, which are responsible for the …
YOLOV8-FDF: A small target detection algorithm in complex scenes
W Jiang, D Han, B Han, Z Wu - IEEE Access, 2024 - ieeexplore.ieee.org
Synthetic Aperture Radar (SAR) finds widespread applications in environmental monitoring,
disaster management, ship surveillance, and military intelligence. However, existing target …
disaster management, ship surveillance, and military intelligence. However, existing target …