Results 31 to 40 of about 96,849 (322)

Adversarial Imitation Attack

open access: yesCoRR, 2020
8 ...
Mingyi Zhou   +6 more
openaire   +2 more sources

On the Effectiveness of Adversarial Training in Defending against Adversarial Example Attacks for Image Classification

open access: yesApplied Sciences, 2020
State-of-the-art neural network models are actively used in various fields, but it is well-known that they are vulnerable to adversarial example attacks.
Sanglee Park, Jungmin So
doaj   +1 more source

Probabilistic Categorical Adversarial Attack & Adversarial Training

open access: yesCoRR, 2022
The existence of adversarial examples brings huge concern for people to apply Deep Neural Networks (DNNs) in safety-critical tasks. However, how to generate adversarial examples with categorical data is an important problem but lack of extensive exploration.
Xu, Han   +6 more
openaire   +2 more sources

Adversarial Attack for SAR Target Recognition Based on UNet-Generative Adversarial Network

open access: yesRemote Sensing, 2021
Some recent articles have revealed that synthetic aperture radar automatic target recognition (SAR-ATR) models based on deep learning are vulnerable to the attacks of adversarial examples and cause security problems.
Chuan Du, Lei Zhang
doaj   +1 more source

Functional Adversarial Attacks

open access: yesCoRR, 2019
Accepted to NeurIPS ...
Cassidy Laidlaw, Soheil Feizi
openaire   +3 more sources

Adversarial Attack Attribution: Discovering Attributable Signals in Adversarial ML Attacks

open access: yesCoRR, 2021
Accepted to RSEML Workshop at AAAI ...
Marissa Dotter   +5 more
openaire   +2 more sources

Adversarial attacks against supervised machine learning based network intrusion detection systems.

open access: yesPLoS ONE, 2022
Adversarial machine learning is a recent area of study that explores both adversarial attack strategy and detection systems of adversarial attacks, which are inputs specially crafted to outwit the classification of detection systems or disrupt the ...
Ebtihaj Alshahrani   +3 more
doaj   +2 more sources

Adversarial Attack Transferability Enhancement Algorithm Based on Input Channel Splitting [PDF]

open access: yesJisuanji gongcheng, 2023
The Deep Neural Network(DNN) has been widely used in face recognition, automatic driving, and other scenarios;however, it is vulnerable to attacks by adversarial samples.Methods by which adversarial samples are generated can be classified into white-box ...
ZHENG Desheng, CHEN Jixin, ZHOU Jing, KE Wuping, LU Chao, ZHOU Yong, QIU Qian
doaj   +1 more source

Distributionally Adversarial Attack

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2019
Recent work on adversarial attack has shown that Projected Gradient Descent (PGD) Adversary is a universal first-order adversary, and the classifier adversarially trained by PGD is robust against a wide range of first-order attacks. It is worth noting that the original objective of an attack/defense model relies on a data distribution p(x), typically ...
Tianhang Zheng   +2 more
openaire   +3 more sources

Adversarial attacks and adversarial robustness in computational pathology

open access: yesNature Communications, 2022
AbstractArtificial Intelligence (AI) can support diagnostic workflows in oncology by aiding diagnosis and providing biomarkers directly from routine pathology slides. However, AI applications are vulnerable to adversarial attacks. Hence, it is essential to quantify and mitigate this risk before widespread clinical use.
Narmin Ghaffari Laleh   +10 more
openaire   +5 more sources

Home - About - Disclaimer - Privacy