Multi-target Category Adversarial Example Generating Algorithm Based on GAN [PDF]
Although deep neural networks perform well in many areas,research shows that deep neural networks are vulnerable to attacks from adversarial examples.There are many algorithms for attacking neural networks,but the attack speed of most attack algorithms ...
LI Jian, GUO Yan-ming, YU Tian-yuan, WU Yu-lun, WANG Xiang-han, LAO Song-yang
doaj +1 more source
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT
The complexity of the Industrial Internet of Things (IIoT) presents higher requirements for intrusion detection systems (IDSs). An adversarial attack is a threat to the security of machine learning-based IDSs.
Shiming Li +4 more
doaj +1 more source
Adversarial Robustness of Deep Reinforcement Learning Based Dynamic Recommender Systems
Adversarial attacks, e.g., adversarial perturbations of the input and adversarial samples, pose significant challenges to machine learning and deep learning techniques, including interactive recommendation systems.
Siyu Wang +5 more
doaj +1 more source
Object Detection Adversarial Attack for Infrared Imagery in Remote Sensing [PDF]
Aiming at the problems of poor effect of existing adversarial attack for object detection algorithms on small-scale target attack, a large number of meaningless disturbances in adversarial samples and low disturbance genera-tion efficiency, taking ...
Qi Jiahao, Zhang Yu, Wan Pengcheng, Li Yuanzhe, Liu Xingyue, Yao Aihuan, Zhong Ping
doaj +1 more source
A Multimodal Adversarial Attack Framework Based on Local and Random Search Algorithms
Although many problems in computer vision and natural language processing have made breakthrough progress with neural networks, adversarial attack is a serious potential problem in many neural network- based applications.
Zibo Yi, Jie Yu, Yusong Tan, Qingbo Wu
doaj +1 more source
Scale-Adaptive Adversarial Patch Attack for Remote Sensing Image Aircraft Detection
With the adversarial attack of convolutional neural networks (CNNs), we are able to generate adversarial patches to make an aircraft undetectable by object detectors instead of covering the aircraft with large camouflage nets. However, aircraft in remote
Mingming Lu, Qi Li, Li Chen, Haifeng Li
doaj +1 more source
Adversarial Patch Attack on Multi-Scale Object Detection for UAV Remote Sensing Images
Although deep learning has received extensive attention and achieved excellent performance in various scenarios, it suffers from adversarial examples to some extent. In particular, physical attack poses a greater threat than digital attack.
Yichuang Zhang +6 more
doaj +1 more source
A Hybrid Adversarial Attack for Different Application Scenarios
Adversarial attack against natural language has been a hot topic in the field of artificial intelligence security in recent years. It is mainly to study the methods and implementation of generating adversarial examples. The purpose is to better deal with
Xiaohu Du +6 more
doaj +1 more source
Adv-Eye: A Transfer-Based Natural Eye Makeup Attack on Face Recognition
Deep face recognition models are vulnerable to adversarial samples generated by adversarial attack methods. However, current attack methods do not adequately represent the security problems of the deep FR models, because they either produce adversarial ...
Jiatian Pi +6 more
doaj +1 more source
A Brute-Force Black-Box Method to Attack Machine Learning-Based Systems in Cybersecurity
Machine learning algorithms are widely utilized in cybersecurity. However, recent studies show that machine learning algorithms are vulnerable to adversarial examples.
Sicong Zhang, Xiaoyao Xie, Yang Xu
doaj +1 more source

