Results 101 to 110 of about 96,849 (322)

Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

open access: yes, 2018
Machine learning systems based on deep neural networks, being able to produce state-of-the-art results on various perception tasks, have gained mainstream adoption in many applications.
Liu, Yannan   +3 more
core   +1 more source

Mathematical Analysis of Adversarial Attacks

open access: yesCoRR, 2018
In this paper, we analyze efficacy of the fast gradient sign method (FGSM) and the Carlini-Wagner's L2 (CW-L2) attack. We prove that, within a certain regime, the untargeted FGSM can fool any convolutional neural nets (CNNs) with ReLU activation; the targeted FGSM can mislead any CNNs with ReLU activation to classify any given image into any prescribed
Zehao Dou   +2 more
openaire   +2 more sources

Decentralized Federated Learning for Wind Turbine Bearing Prognostics Under Data Scarcity and Statistical Heterogeneity

open access: yesEnergy Science &Engineering, EarlyView.
This paper proposes a decentralized peer‐to‐peer federated learning framework for wind turbine bearing remaining useful life prediction, introducing a virtual client paradigm in which statistical health indicators serve as independent feature‐level clients—enabling privacy‐preserving collaborative prognostics from a single physical asset under ...
Jihene Sidhom   +2 more
wiley   +1 more source

IDSGAN: Generative Adversarial Networks for Attack Generation against Intrusion Detection

open access: yes, 2019
As an important tool in security, the intrusion detection system bears the responsibility of the defense to network attacks performed by malicious traffic.
Lin, Zilong, Shi, Yong, Xue, Zhi
core  

Artificial Intelligence in Ophthalmology: Current Status, Challenges, and Future Perspectives

open access: yesHealth Care Science, EarlyView.
Current research of artificial intelligence (AI) in ophthalmology. ABSTRACT Artificial intelligence (AI) is revolutionizing ophthalmology by providing innovative solutions for disease screening, diagnosis, personalized treatment, and the delivery of global healthcare services.
She Chongyang, Tao Yong
wiley   +1 more source

Ctta: a novel chain-of-thought transfer adversarial attacks framework for large language models

open access: yesCybersecurity
Recent studies have indicated that large language models (LLMs) remain susceptible to adversarial attacks, despite enhanced robustness through the chain-of-thought (CoT) capability.
Xinxin Yue   +3 more
doaj   +1 more source

Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps

open access: yesJournal of Corporate Accounting &Finance, EarlyView.
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley   +1 more source

Distillation-Based Cross-Model Transferable Adversarial Attack for Remote Sensing Image Classification

open access: yesRemote Sensing
Deep neural networks have achieved remarkable performance in remote sensing image (RSI) classification tasks. However, they remain vulnerable to adversarial attack.
Xiyu Peng, Jingyi Zhou, Xiaofeng Wu
doaj   +1 more source

Home - About - Disclaimer - Privacy