Results 21 to 30 of about 85,609 (269)

Composite Adversarial Attacks

open access: yesProceedings of the AAAI Conference on Artificial Intelligence, 2021
Adversarial attack is a technique for deceiving Machine Learning (ML) models, which provides a way to evaluate the adversarial robustness. In practice, attack algorithms are artificially selected and tuned by human experts to break a ML system. However, manual selection of attackers tends to be sub-optimal, leading to a mistakenly assessment of model ...
Xiaofeng Mao   +5 more
openaire   +2 more sources

Online Adversarial Attacks

open access: yesCoRR, 2021
Adversarial attacks expose important vulnerabilities of deep learning models, yet little attention has been paid to settings where data arrives as a stream. In this paper, we formalize the online adversarial attack problem, emphasizing two key elements found in real-world use-cases: attackers must operate under partial knowledge of the target model ...
Andjela Mladenovic   +6 more
openaire   +3 more sources

Textual Adversarial Training Method Based on Distributed Perturbation [PDF]

open access: yesJisuanji gongcheng, 2023
Text adversarial defense aims to enhance the resilience of neural network models against different adversarial attacks. The current text confrontation defense methods are usually only effective against certain specific confrontation attacks and have ...
Zhidong SHEN, Hengxian YUE
doaj   +1 more source

Augmented Lagrangian Adversarial Attacks [PDF]

open access: yes2021 IEEE/CVF International Conference on Computer Vision (ICCV), 2021
ICCV 2021 (Poster).
Jérôme Rony   +3 more
openaire   +2 more sources

Statistical Detection of Adversarial Examples in Blockchain-Based Federated Forest In-Vehicle Network Intrusion Detection Systems

open access: yesIEEE Access, 2022
The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in ...
Ibrahim Aliyu   +4 more
doaj   +1 more source

Meta Gradient Adversarial Attack [PDF]

open access: yes2021 IEEE/CVF International Conference on Computer Vision (ICCV), 2021
In recent years, research on adversarial attacks has become a hot spot. Although current literature on the transfer-based adversarial attack has achieved promising results for improving the transferability to unseen black-box models, it still leaves a long way to go. Inspired by the idea of meta-learning, this paper proposes a novel architecture called
Zheng Yuan 0005   +5 more
openaire   +2 more sources

Deflecting Adversarial Attacks

open access: yesCoRR, 2020
There has been an ongoing cycle where stronger defenses against adversarial attacks are subsequently broken by a more advanced defense-aware attack. We present a new approach towards ending this cycle where we "deflect'' adversarial attacks by causing the attacker to produce an input that semantically resembles the attack's target class.
Yao Qin 0001   +4 more
openaire   +2 more sources

Detection of Adversarial Attacks and Characterization of Adversarial Subspace [PDF]

open access: yesICASSP 2020 - 2020 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2020
Adversarial attacks have always been a serious threat for any data-driven model. In this paper, we explore subspaces of adversarial examples in unitary vector domain, and we propose a novel detector for defending our models trained for environmental sound classification.
Mohammad Esmaeilpour   +2 more
openaire   +2 more sources

Adversarial Imitation Attack

open access: yesCoRR, 2020
8 ...
Mingyi Zhou   +6 more
openaire   +2 more sources

Defense against Adversarial Patch Attacks for Aerial Image Semantic Segmentation by Robust Feature Extraction

open access: yesRemote Sensing, 2023
Deep learning (DL) models have recently been widely used in UAV aerial image semantic segmentation tasks and have achieved excellent performance. However, DL models are vulnerable to adversarial examples, which bring significant security risks to safety ...
Zhen Wang   +3 more
doaj   +1 more source

Home - About - Disclaimer - Privacy