Gradual poisoning of a chest x-ray convolutional neural network with an adversarial attack and AI explainability methods. [PDF]
Lee SB.
europepmc +1 more source
Identifying significant features in adversarial attack detection framework using federated learning empowered medical IoT network security. [PDF]
Sharaf SA, Nooh S.
europepmc +1 more source
Hard label adversarial attack with high query efficiency against NLP models. [PDF]
Qiu S +6 more
europepmc +1 more source
A Local Adversarial Attack with a Maximum Aggregated Region Sparseness Strategy for 3D Objects. [PDF]
Zhao L +7 more
europepmc +1 more source
A two-tier optimization strategy for feature selection in robust adversarial attack mitigation on internet of things network security. [PDF]
Prasad KS +6 more
europepmc +1 more source
Machine learning models, and in particular deep neural networks, are now widely deployed in applications that demand high levels of accuracy and reliability. However, over the past decade, researchers have shown that these systems are not inherently robust, as they are vulnerable to adversarial interventions that can manipulate their behavior in subtle
openaire +1 more source
Implications of Minimum Description Length for Adversarial Attack in Natural Language Processing. [PDF]
Tiwari K, Zhang L.
europepmc +1 more source
Image classification models have been widely applied to facilitate functions such as autonomous perception and positioning for automated driving in many transportation systems, including automobiles, autonomous rail and urban rail transit systems ...
TANG Jun +3 more
doaj
Fast Adversarial Training against Textual Adversarial Attacks
Many adversarial defense methods have been proposed to enhance the adversarial robustness of natural language processing models. However, most of them introduce additional pre-set linguistic knowledge and assume that the synonym candidates used by attackers are accessible, which is an ideal assumption.
Yang, Yichen, Liu, Xin, He, Kun
openaire +1 more source
Attentional semantic attack for enhancing adversarial samples transferability. [PDF]
Wang P, Liu J.
europepmc +1 more source

