作者: Nalini K Ratha , Gaurav Goswami , Richa Singh , Akshay Agarwal , Mayank Vatsa
DOI: 10.1109/TNNLS.2021.3051529
关键词:
摘要: Adversarial perturbations have demonstrated the vulnerabilities of deep learning algorithms to adversarial attacks. Existing adversary detection algorithms attempt to detect the …