Skip to main content
Procon Ltd. Information & Security: An International Journal
About
Business areas
Business Process
Business Intelligence
Knowledge Dissemination
Studies
Publishing
Partners
News
Books & Papers
Books
Authors
Keywords
Vesselin Petkov
Introduction
Short CV
insert short SV here
Full profile
This is the longer CV, presenting education, work experience, etc.
Publications
Afifi, Mahmoud
, and
Michael S. Brown
.
What else can fool deep learning? addressing color constancy errors on deep neural network performance
In
Proceedings of the IEEE International Conference on Computer Vision
., 2019.
Akhtar, Naveed
, and
Ajmal Mian
.
"
Threat of adversarial attacks on deep learning in computer vision: A survey
."
IEEE Access
6 (2018): 14410-14430.
Al-Janabi, Shaimaa
,
Henk-Jan van Slooten
,
Mike Visser
,
Tjeerd van der Ploeg
,
Paul J. van Diest
, and
Mehdi Jiwa
.
"
Evaluation of mitotic activity index in breast cancer using whole slide digital images
."
PloS one
8, no. 12 (2013).
Armanious, Karim
,
Youssef Mecky
,
Sergios Gatidis
, and
Bin Yang
.
Adversarial inpainting of medical image modalities
In
In: ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP)
., 2019.
Athalye, Anish
,
Logan Engstrom
,
Andrew Ilyas
, and
Kevin Kwok
.
Synthesizing robust adversarial examples
In
35th International Conference on Machine Learning, PMLR
. Vol. 80. Stockholm, Sweden, 2018.
Brown, T.B.
,
D. Mané
,
A. Roy
,
M. Abadi
, and
J. Gilmer
.
"
Adversarial Patch
."
arXiv e-prints
(2018).
Chuquicusma, Maria
,
Sarfaraz Hussein
,
Jeremy Burt
, and
Ulas Bagci
.
How to fool radiologists with generative adversarial networks? a visual turing test for lung cancer diagnosis
In
2018 IEEE 15th international symposium on biomedical imaging (ISBI 2018)
., 2018.
Deng, Yepeng
,
Chunkai Zhang
, and
Xuan Wang
.
A multi-objective examples generation approach to fool the deep neural networks in the black-box scenario
In
2019 IEEE Fourth International Conference on Data Science in Cyberspace (DSC)
., 2019.
Finlayson, Samuel
,
Hyung Won Chung
,
Isaac Kohane
, and
Andrew Beam
.
"
Adversarial attacks against medical deep learning systems
."
arXiv e-print
(2019).
Goodfellow, Ian
,
Yoshua Bengio
, and
Aaron Courville
.
Deep Learning
. MIT Press, 2016.
Gu, Tianyu
,
Kang Liu
,
Brendan Dolan-Gavitt
, and
Siddharth Garg
.
"
Badnets: Evaluating backdooring attacks on deep neural networks
."
IEEE Access
7 (2019): 47230-47244.
Gu, Zhaoquan
,
Weixiong Hu
,
Chuanjing Zhang
,
Hui Lu
,
Lihua Yin
, and
Le Wang
.
"
Gradient shielding: Towards understanding vulnerability of deep neural networks
." In
IEEE Transactions on Network Science and Engineering
., 2020.
Junqueira, Luis Carlos
, and
Jose Carneiro
.
Basic Histology Text & Atlas
. McGraw-Hill Professional, 2005.
Kieffer, Brady
,
Morteza Babaie
,
Shivam Kalra
, and
H.R.Tizhoosh
.
Convolutional neural networks for histopathology image classification: Training vs. using pre-trained networks
In
2017 Seventh International Conference on Image Processing Theory, Tools and Applications (IPTA)
., 2017.
Komura, Daisuke
, and
Shumpei Ishikawa
.
"
Machine learning methods for histopathological image analysis
."
Computational and structural biotechnology journal
16 (2018): 34-42.
Kügler, David
,
Alexander Distergoft
,
Arjan Kuijper
, and
Anirban Mukhopadhyay
.
"
Exploring adversarial examples
." In
Understanding and Interpreting Machine Learning in Medical Image Computing Applications
, 70-78. Springer, 2018.
Kumar, Neeraj
,
Ruchika Verma
,
Sanuj Sharma
,
Surabhi Bhargava
,
Abhishek Vahadane
, and
Amit Sethi
.
"
A dataset and a technique for generalized nuclear segmentation for computational pathology
."
IEEE transactions on medical imaging
36, no. 7 (2017): 1550-1560.
Kumar, Vinay
,
Abul Abbas
, and
Jon Aster
.
Robbins basic pathology
. Philadelphia, USA, Saunders: Elsevier, 2017.
Madry, Aleksander
,
Aleksandar Makelov
,
Ludwig Schmidt
,
Dimitris Tsipras
, and
Adrian Vladu
.
"
Towards Deep Learning Models Resistant to Adversarial Attacks
."
arXiv e-prints arXiv:1706.06083
(2019).
Mihajlović, Marko
, and
Nikola Popović
.
Fooling a neural network with common adversarial noise
In
2018 19th IEEE Mediterranean Electrotechnical Conference (MELECON)
., 2018.
Mikołajczyk, Agnieszka
, and
Michał Grochowski
.
Data augmentation for improving deep learning in image classification problem
In
2018 international interdisciplinary PhD workshop (IIPhDW)
., 2018.
Moosavi-Dezfooli, Seyed-Mohsen
,
Alhussein Fawzi
, and
Pascal Frossard
.
Deepfool: a simple and accurate method to fool deep neural networks
In
IEEE Conference on Computer Vision and Pattern Recognition
., 2016.
Murugesan, Muthukumar
, and
R. Sukanesh
.
Automated detection of brain tumor in eeg signals using artificial neural networks
In
2009 International Conference on Advances in Computing, Control, and Telecommunication Technologies
., 2009.
Nam, Soojeong
,
Yosep Chong
,
Chan Kwon Jung
,
Tae-Yeong Kwak
,
Ji Youl Lee
,
Jihwan Park
,
Mi Jung Rho
, and
Heounjeong Go
.
"
Introduction to digital pathology and computer-aided pathology
."
The Korean Journal of Pathology
54, no. 2 (2020): 125-134.
Nguyen, Anh
,
Jason Yosinski
, and
Jeff Clune
.
Deep neural networks are easily fooled: High confidence predictions for unrecognizable images
In
IEEE Conference on Computer Vision and Pattern Recognition
., 2015.
Pages
« първа
‹ предишна
…
433
434
435
436
437
438
439
440
441
…
следваща ›
последна »
469538 reads
Search form
Search
Information & Security journal
I&S Volumes
Policy
Editorial Board
Active Calls
Copyright & Licensing
Indexing & Archiving
Submit a paper
Books & Papers
Top downloads
Previews
On Inequalities Bounding Imprecision and Nonspecificity Measures of Uncertainty
On the Effectiveness of Measures of Uncertainty of Basic Belief Assignments
Blockchain in Agriculture
Multi-UAV Mission Planning for Monitoring Critical Infrastructures Considering Failures and Cyberattacks
A Hybrid Intrusion Detection with Decision Tree for Feature Selection
European Conflict Analysis Project (ECAP)
Generalized Net Model of the Water Resources Assessment Process and Water Use Management
view all
News
14/08/2020
Nanotechnology and Global Security
14/08/2020
Nanotechnology and Global Security
13/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
13/08/2020
Hybrid War: High-tech, Information and Cyber Conflicts
13/08/2020
The Age of Post-Truth: State Influence and Strategic Communication - Contemporary Security Challenges on Europe’s Eastern Flank:
11/08/2020
How Improved Attribution in Cyber Warfare Can Help De-Escalate Cyber Arms Race
10/08/2020
Social Media accounts
10/07/2020
The Winter 2020 issue of Connections
10/10/2018
The Summer-Fall 2018 issue of Connections
10/04/2018
The Winter 2018 issue of Connections
view all