Transferability of features for neural networks links to adversarial attacks and defences. [PDF]
Kotyan S, Matsuki M, Vargas DV.
europepmc +1 more source
Transform-Dependent Adversarial Attacks
Deep networks are highly vulnerable to adversarial attacks, yet conventional attack methods utilize static adversarial perturbations that induce fixed mispredictions. In this work, we exploit an overlooked property of adversarial perturbations--their dependence on image transforms--and introduce transform-dependent adversarial attacks.
Tan, Yaoteng +2 more
openaire +2 more sources
ABSTRACT Recent literature calls for scholars to bridge the divide that has emerged between criminology and regulation and governance. In the current work, we propose that criminological opportunity theories provide one fruitful pathway to that end.
Carole Gibbs +3 more
wiley +1 more source
The strength of Nesterov's accelerated gradient in boosting transferability of stealthy adversarial attacks. [PDF]
Lin C, Long S.
europepmc +1 more source
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks. [PDF]
Ding K +6 more
europepmc +1 more source
Artificial intelligence in blood donor management: A narrative review
Abstract Blood transfusions are vital in health care, yet maintaining an adequate and safe blood supply remains a significant challenge. To address blood donation–associated challenges, this review explores how integrating artificial intelligence (AI) technologies can improve donor recruitment, retention and management.
Maha A. Badawi
wiley +1 more source
Hybrid framework for image forgery detection and robustness against adversarial attacks using vision transformer and SVM. [PDF]
Abdelmaksoud M +3 more
europepmc +1 more source
An Overview of Deep Learning Techniques for Big Data IoT Applications
Reviews deep learning integration with cloud, fog, and edge computing in IoT architectures. Examines model suitability across IoT applications, key challenges, and emerging trends Provides a comparative analysis to guide future deep learning research in IoT environments.
Gagandeep Kaur +2 more
wiley +1 more source
A comprehensive survey of deep face verification systems adversarial attacks and defense strategies. [PDF]
Kilany S, Mahfouz A.
europepmc +1 more source
Towards Robustifying Image Classifiers against the Perils of Adversarial Attacks on Artificial Intelligence Systems. [PDF]
Anastasiou T +6 more
europepmc +1 more source

