Picture for Muhammad Zaid Hameed

Muhammad Zaid Hameed

Boundary Adversarial Examples Against Adversarial Overfitting

Add code
Nov 25, 2022
Viaarxiv icon

Less is More: Feature Selection for Adversarial Robustness with Compressive Counter-Adversarial Attacks

Add code
Jun 18, 2021
Figure 1 for Less is More: Feature Selection for Adversarial Robustness with Compressive Counter-Adversarial Attacks
Figure 2 for Less is More: Feature Selection for Adversarial Robustness with Compressive Counter-Adversarial Attacks
Figure 3 for Less is More: Feature Selection for Adversarial Robustness with Compressive Counter-Adversarial Attacks
Figure 4 for Less is More: Feature Selection for Adversarial Robustness with Compressive Counter-Adversarial Attacks
Viaarxiv icon

Perceptually Constrained Adversarial Attacks

Add code
Feb 14, 2021
Figure 1 for Perceptually Constrained Adversarial Attacks
Figure 2 for Perceptually Constrained Adversarial Attacks
Figure 3 for Perceptually Constrained Adversarial Attacks
Figure 4 for Perceptually Constrained Adversarial Attacks
Viaarxiv icon

Communication without Interception: Defense against Deep-Learning-based Modulation Detection

Add code
Feb 27, 2019
Figure 1 for Communication without Interception: Defense against Deep-Learning-based Modulation Detection
Figure 2 for Communication without Interception: Defense against Deep-Learning-based Modulation Detection
Figure 3 for Communication without Interception: Defense against Deep-Learning-based Modulation Detection
Figure 4 for Communication without Interception: Defense against Deep-Learning-based Modulation Detection
Viaarxiv icon