{"@context":["https://w3id.org/fdo/context/v1",{"schema":"https://schema.org/","prov":"http://www.w3.org/ns/prov#","fdo":"https://w3id.org/fdo/vocabulary/"}],"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q6567075","@type":"DigitalObject","kernel":{"@id":"https://fdo.portal.mardi4nfdi.de/fdo/Q6567075","digitalObjectType":"https://schema.org/ScholarlyArticle","primaryIdentifier":"mardi:Q6567075","kernelVersion":"v1","immutable":true,"modified":"2025-03-06T22:34:34Z"},"profile":{"@context":"https://schema.org","@type":"ScholarlyArticle","@id":"https://portal.mardi4nfdi.de/entity/Q6567075","name":"A Review of Adversarial Attack and Defense for Classification Methods","headline":"A Review of Adversarial Attack and Defense for Classification Methods","description":"scientific article; zbMATH DE number 7875964","url":"https://portal.mardi4nfdi.de/entity/Q6567075","datePublished":"2024-07-04","author":[{"@id":"https://portal.mardi4nfdi.de/entity/Q288195"},{"@id":"https://portal.mardi4nfdi.de/entity/Q6567074"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2217424"},{"@id":"https://portal.mardi4nfdi.de/entity/Q484037"}],"publisher":[{"@id":"https://portal.mardi4nfdi.de/entity/Q60297"}],"identifier":{"@type":"PropertyValue","propertyID":"doi","value":"10.1080/00031305.2021.2006781","url":"https://doi.org/10.1080/00031305.2021.2006781"},"sameAs":["https://doi.org/10.1080/00031305.2021.2006781"],"citation":[{"@id":"https://portal.mardi4nfdi.de/entity/Q5270493"},{"@id":"https://portal.mardi4nfdi.de/entity/Q1731054"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2397749"},{"@id":"https://portal.mardi4nfdi.de/entity/Q2217425"},{"@id":"https://portal.mardi4nfdi.de/entity/Q4969087"},{"@id":"https://portal.mardi4nfdi.de/entity/Q5313591"}]},"provenance":{"prov:generatedAtTime":"2025-03-06T22:34:34Z","prov:wasAttributedTo":"MaRDI Knowledge Graph"}}