| _ | malicious | _ |
| Active Resilient Secure Control for Heterogeneous Swarm Systems Under | malicious | Cyber-Attacks |
| Adaptive Intrusion Detection of | malicious | Unmanned Air Vehicles Using Behavior Rule Specifications |
| Afriat's Test for Detecting | malicious | Agents |
| Blockchain-Powered | malicious | Node Detection in Internet of Autonomous Vehicles, A |
| Co-Design of Enhanced Fuzzy Observer-Based Estimation and Gain-Scheduling Control for Active Suspension Systems Under | malicious | Attacks |
| Comprehensive Resilient Control Strategy for CBTC Systems Through Train-to-Train Communications Under | malicious | Attacks, A |
| Cooperative Positioning Technique With Decentralized | malicious | Vehicle Detection |
| Countering | malicious | DeepFakes: Survey, Battleground, and Horizon |
| Detecting | malicious | IoT network communication through Graph Neural Networks in real-world conditions |
| Detection of | malicious | Agents in Social Learning |
| Do We Really Need Curated | malicious | Data for Safety Alignment in Multi-modal Large Language Models? |
| Edit Away and My Face Will not Stay: Personal Biometric Defense against | malicious | Generative Editing |
| Enhanced Multi-Stage Deep Learning Framework for Detecting | malicious | Activities From Autonomous Vehicles, An |
| Enhancing the Robustness of Neural Collaborative Filtering Systems Under | malicious | Attacks |
| Evaluating the Resilience of Face Recognition Systems Against | malicious | Attacks |
| Fighting | malicious | Media Data: A Survey on Tampering Detection and Deepfake Detection |
| Filtering | malicious | Messages by Trust-Aware Cognitive Routing in Vehicular Ad Hoc Networks |
| HDRS: A Hybrid Reputation System With Dynamic Update Interval for Detecting | malicious | Vehicles in VANETs |
| IMMA: Immunizing Text-to-image Models Against | malicious | Adaptation |
| Invertible Watermarking Algorithm with Detecting Locations of | malicious | Manipulation for Biometric Image Authentication |
| malicious | User Detection in Non-Orthogonal Multiple Access Based on Spectrum Analysis |
| malicious | Vehicle Detection Scheme Based on Spatio-Temporal Features of Traffic Flow Under Cloud-Fog Computing-Based IoVs |
| MedBN: Robust Test-Time Adaptation against | malicious | Test Samples |
| Minimal-time Trajectories for Interception of | malicious | Drones in Constrained Environments |
| Multi-Scale Fusion for Improved Localization of | malicious | Tampering in Digital Images |
| Performance Prescribed Cooperative Guidance Against Maneuvering Target Under | malicious | Attacks |
| Robust CAPTCHAs Towards | malicious | OCR |
| robust image authentication method distinguishing JPEG compression from | malicious | manipulation, A |
| RSSI Map-Based Trajectory Design for UGV Against | malicious | Radio Source: A Reinforcement Learning Approach |
| Visualizing Android | malicious | Applications Using Texture Features |
30 for malicious