Results 121 to 130 of about 16,308 (300)
ABSTRACT Intelligent and adaptive defence systems that can quickly thwart changing cyberthreats are becoming more and more necessary in the dynamic and data‐intensive Internet of things (IoT) environment. Using the NSL‐KDD benchmark dataset, this paper presents an improved anomaly detection system that combines an optimised sequential neural network ...
Seong‐O Shim +4 more
wiley +1 more source
Recent studies have shown that machine-learning models are vulnerable to adversarial attacks. Adversarial attacks are deliberate attempts to modify the input data of a machine learning model in a way that causes it to produce incorrect predictions.
Palakorn Kamnounsing +3 more
doaj +1 more source
Patch-wise++ Perturbation for Adversarial Targeted Attacks [PDF]
Lianli Gao +3 more
openalex +1 more source
Adversarial Attacks on Hyperbolic Networks
As hyperbolic deep learning grows in popularity, so does the need for adversarial robustness in the context of such a non-Euclidean geometry. To this end, this paper proposes hyperbolic alternatives to the commonly used FGM and PGD adversarial attacks.
Max van Spengler +2 more
openaire +2 more sources
A Probability‐Aware AI Framework for Reliable Anti‐Jamming Communication
ABSTRACT Adversarial jamming attacks have increased on communication systems, causing distortion and threatening transmissions. Typical attacks rely on traditional, well‐defined cryptographic protocols and frequency‐hopping techniques. Nevertheless, these techniques become vulnerable when facing intelligent jammers.
Tawfeeq Shawly, Ahmed A. Alsheikhy
wiley +1 more source
Certified Accuracy and Robustness: How different architectures stand up to adversarial attacks
Adversarial attacks are a concern for image classification using neural networks. Numerous methods have been created to minimize the effects of attacks, where the best defense against such attacks is through adversarial training, which has proven to be ...
Azryl Elmy Sarih +2 more
doaj +1 more source
Towards Interpretable Adversarial Examples via Sparse Adversarial Attack
Sparse attacks are to optimize the magnitude of adversarial perturbations for fooling deep neural networks (DNNs) involving only a few perturbed pixels (i.e., under the l0 constraint), suitable for interpreting the vulnerability of DNNs. However, existing solutions fail to yield interpretable adversarial examples due to their poor sparsity. Worse still,
Lin, Fudong +4 more
openaire +2 more sources
AT‐AER: Adversarial Training With Adaptive Example Reuse
ABSTRACT Adversarial training (AT) is widely regarded as a crucial defense method for deep neural networks against adversarial attacks. Most of the existing AT methods suffer from the problems of insufficient coverage of perturbation space and robust overfitting.
Meng Hu +5 more
wiley +1 more source
Robustness Against Adversarial Attacks Via Learning Confined Adversarial Polytopes
Comment: The paper has been accepted in ICASSP ...
Hamidi, Shayan Mohajer, Ye, Linfeng
openaire +2 more sources
While death remains a popular topic for anthropology, relatively few ethnographic accounts consider the modern bureaucratic processes accompanying it. One such process is public health autopsy, which scholars have largely taken for granted. Existing analysis has regarded it as a form of ‘cultural brokering’ and autopsy reluctance in communities is seen,
David M.R. Orr
wiley +1 more source

