Results 41 to 50 of about 96,849 (322)
Secure machine learning against adversarial samples at test time
Deep neural networks (DNNs) are widely used to handle many difficult tasks, such as image classification and malware detection, and achieve outstanding performance.
Jing Lin, Laurent L. Njilla, Kaiqi Xiong
doaj +1 more source
Impact of adversarial examples on deep learning models for biomedical image segmentation [PDF]
Deep learning models, which are increasingly being used in the field of medical image analysis, come with a major security risk, namely, their vulnerability to adversarial examples.
C Pena-Betancor +3 more
core +4 more sources
Query complexity of adversarial attacks
There are two main attack models considered in the adversarial robustness literature: black-box and white-box. We consider these threat models as two ends of a fine-grained spectrum, indexed by the number of queries the adversary can ask. Using this point of view we investigate how many queries the adversary needs to make to design an attack that is ...
Grzegorz Gluch, RĂ¼diger L. Urbanke
openaire +3 more sources
Adversarial Attacks and Defenses
Despite the recent advances in a wide spectrum of applications, machine learning models, especially deep neural networks, have been shown to be vulnerable to adversarial attacks. Attackers add carefully-crafted perturbations to input, where the perturbations are almost imperceptible to humans, but can cause models to make wrong predictions.
Ninghao Liu +4 more
openaire +2 more sources
Using Frequency Attention to Make Adversarial Patch Powerful Against Person Detector
Deep neural networks (DNNs) are vulnerable to adversarial attacks. In particular, object detectors may be attacked by applying a particular adversarial patch to the image.
Xiaochun Lei +5 more
doaj +1 more source
HopSkipJumpAttack: A Query-Efficient Decision-Based Attack
The goal of a decision-based adversarial attack on a trained model is to generate adversarial examples based solely on observing output labels returned by the targeted model.
Chen, Jianbo +2 more
core +1 more source
Real-Time Adversarial Attacks [PDF]
In recent years, many efforts have demonstrated that modern machine learning algorithms are vulnerable to adversarial attacks, where small, but carefully crafted, perturbations on the input can make them fail. While these attack methods are very effective, they only focus on scenarios where the target model takes static input, i.e., an attacker can ...
Yuan Gong 0001 +3 more
openaire +2 more sources
Robust Audio Adversarial Example for a Physical Attack
We propose a method to generate audio adversarial examples that can attack a state-of-the-art speech recognition model in the physical world. Previous work assumes that generated adversarial examples are directly fed to the recognition model, and is not ...
Sakuma, Jun, Yakura, Hiromu
core +1 more source
Using LIP to Gloss Over Faces in Single-Stage Face Detection Networks
This work shows that it is possible to fool/attack recent state-of-the-art face detectors which are based on the single-stage networks. Successfully attacking face detectors could be a serious malware vulnerability when deploying a smart surveillance ...
D Chen +5 more
core +1 more source
Multi-Stage Adversarial Defense for Online DDoS Attack Detection System in IoT
Machine learning-based Distributed Denial of Service (DDoS) attack detection systems have proven effective in detecting and preventing DDoD attacks in Internet of Things (IoT) systems.
Yonas Kibret Beshah +2 more
doaj +1 more source

