Chest x-ray images for lung disease detection using deep learning techniques: a comprehensive survey

MAA Al-qaness, J Zhu, D AL-Alimi, A Dahou… - … Methods in Engineering, 2024 - Springer
In medical imaging, the last decade has witnessed a remarkable increase in the availability
and diversity of chest X-ray (CXR) datasets. Concurrently, there has been a significant …

Controlled graph neural networks with denoising diffusion for anomaly detection

X Li, C **ao, Z Feng, S Pang, W Tai, F Zhou - Expert systems with …, 2024 - Elsevier
Leveraging labels in a supervised learning framework as prior knowledge to enhance
network anomaly detection has become a trend. Unfortunately, just a few labels are typically …

Adversarial camouflage for node injection attack on graphs

S Tao, Q Cao, H Shen, Y Wu, L Hou, F Sun… - Information Sciences, 2023 - Elsevier
Node injection attacks on Graph Neural Networks (GNNs) have received increasing
attention recently, due to their ability to degrade GNN performance with high attack success …

Understanding and improving adversarial transferability of vision transformers and convolutional neural networks

Z Chen, C Xu, H Lv, S Liu, Y Ji - Information Sciences, 2023 - Elsevier
Convolutional neural networks (CNNs) and visual transformers (ViTs) are both known to be
vulnerable to adversarial examples. Recent work has illustrated the existence of …

A realistic model extraction attack against graph neural networks

F Guan, T Zhu, H Tong, W Zhou - Knowledge-Based Systems, 2024 - Elsevier
Abstract Model extraction attacks are considered to be a significant avenue of vulnerability in
machine learning. In model extraction attacks, the attacker repeatedly queries a victim model …

AGS: Transferable adversarial attack for person re-identification by adaptive gradient similarity attack

Z Tao, Z Lu, J Peng, H Wang - Knowledge-Based Systems, 2024 - Elsevier
Person re-identification (Re-ID) has achieved tremendous success in the fields of computer
vision and security. However, Re-ID models are susceptible to adversarial examples, which …

Defending adversarial attacks in Graph Neural Networks via tensor enhancement

J Zhang, Y Hong, D Cheng, L Zhang, Q Zhao - Pattern Recognition, 2025 - Elsevier
Abstract Graph Neural Networks (GNNs) have demonstrated remarkable success across
diverse fields, yet remain susceptible to subtle adversarial perturbations that significantly …

Explainability in image captioning based on the latent space

S Elguendouze, A Hafiane, MCP de Souto… - Neurocomputing, 2023 - Elsevier
This paper focuses on the representation/latent space in neural architectures to develop an
end-to-end explanation approach for Image Captioning (IC) models. By injecting Gaussian …

A novel hybrid model combining BPNN neural network and ensemble empirical mode decomposition

H Li, Q Wang, D Wei - International Journal of Computational Intelligence …, 2024 - Springer
Neural network models have been successfully used to predict stock prices, weather, and
traffic patterns. Due to the sensitivity of the data, it is very effective in identifying and …

Multi-view ensemble learning based-robust graph convolutional networks against adversarial attacks

T Wu, J Luo, S Qiao, C Wang, L Yuan… - IEEE Internet of …, 2024 - ieeexplore.ieee.org
Graph neural networks (GNNs) have been widely applied in the Internet of Things (IoT) for
the intelligent analysis of data collected by sensors, particularly complex relationships and …