Adversarial Attacks on Automatic Speech Recognition (ASR): A Survey
Automatic Speech Recognition (ASR) systems have improved and eased how humans interact with devices. ASR system converts an acoustic waveform into the relevant text form.
Amisha Rajnikant Bhanushali +2 more
doaj +1 more source
A Comprehensive Review on Adversarial Attack Detection Analysis in Deep Learning
Soni Kumari, Sheshang Degadwala
openalex +1 more source
Adversarial detection based on feature invariant in license plate recognition systems
Deep neural networks have become an integral part of people's daily lives. However, researchers observed that these networks were susceptible to threats from adversarial samples, leading to abnormal behaviors such as misclassification by the network ...
ZHU Xiaoyu +4 more
doaj
FAMF: Robust Feature-Level Adversarial Attack on Metric-Based Few-Shot Learning Models
Few-shot learning has emerged as the primary approach for tasks with extremely limited training data. In particular, metric-based few-shot learning has been highlighted for enabling effective generalization to new tasks by comparing feature similarity ...
Gwang-Nam Kim +4 more
doaj +1 more source
Robustness of Sparsely Distributed Representations to Adversarial Attacks in Deep Neural Networks. [PDF]
Sardar N, Khan S, Hintze A, Mehra P.
europepmc +1 more source
Attack and Reset for Unlearning: Exploiting Adversarial Noise toward Machine Unlearning through Parameter Re-initialization [PDF]
Yoonhwa Jung +3 more
openalex +1 more source
Defeating Adversarial Attacks Againt Adversarial attacks in Network Security
Ehsan Nowroozi +5 more
openalex +1 more source
Recurrent Attention Model with Log-Polar Mapping is Robust against Adversarial Attacks [PDF]
Taro Kiritani, Koji Ono
openalex +1 more source
Textile and colour defect detection using deep learning methods
Abstract Recent advances in deep learning (DL) have significantly enhanced the detection of textile and colour defects. This review focuses specifically on the application of DL‐based methods for defect detection in textile and coloration processes, with an emphasis on object detection and related computer vision (CV) tasks.
Hao Cui +2 more
wiley +1 more source
EIFDAA: Evaluation of an IDS with function-discarding adversarial attacks in the IIoT. [PDF]
Li S, Wang J, Wang Y, Zhou G, Zhao Y.
europepmc +1 more source

