Results 31 to 40 of about 1,209,773 (317)
Adversarial Attacks on Adversarial Bandits
Accepted by ICLR ...
Ma, Yuzhe, Zhou, Zhijin
openaire +2 more sources
The internet-of-Vehicle (IoV) can facilitate seamless connectivity between connected vehicles (CV), autonomous vehicles (AV), and other IoV entities. Intrusion Detection Systems (IDSs) for IoV networks can rely on machine learning (ML) to protect the in ...
Ibrahim Aliyu +4 more
doaj +1 more source
Defense Against Adversarial Attacks Using High-Level Representation Guided Denoiser [PDF]
Neural networks are vulnerable to adversarial examples, which poses a threat to their application in security sensitive systems. We propose high-level representation guided denoiser (HGD) as a defense for image classification.
Fangzhou Liao +5 more
semanticscholar +1 more source
TextAttack: A Framework for Adversarial Attacks, Data Augmentation, and Adversarial Training in NLP
While there has been substantial research using adversarial attacks to analyze NLP models, each attack is implemented in its own code repository. It remains challenging to develop NLP attacks and utilize them to improve model performance.
John X. Morris +5 more
semanticscholar +1 more source
Boosting Adversarial Attacks with Momentum
Deep neural networks are vulnerable to adversarial examples, which poses security concerns on these algorithms due to the potentially severe consequences.
Yinpeng Dong +6 more
semanticscholar +1 more source
A Survey of Robustness and Safety of 2D and 3D Deep Learning Models against Adversarial Attacks [PDF]
Benefiting from the rapid development of deep learning, 2D and 3D computer vision applications are deployed in many safe-critical systems, such as autopilot and identity authentication.
Yanjie Li +4 more
semanticscholar +1 more source
Adversarial attack is a technique for deceiving Machine Learning (ML) models, which provides a way to evaluate the adversarial robustness. In practice, attack algorithms are artificially selected and tuned by human experts to break a ML system. However, manual selection of attackers tends to be sub-optimal, leading to a mistakenly assessment of model ...
Mao, Xiaofeng +5 more
openaire +2 more sources
Deep learning (DL) models have recently been widely used in UAV aerial image semantic segmentation tasks and have achieved excellent performance. However, DL models are vulnerable to adversarial examples, which bring significant security risks to safety ...
Zhen Wang +3 more
doaj +1 more source
Recent advances in machine learning show that neural models are vulnerable to minimally perturbed inputs, or adversarial examples. Adversarial algorithms are optimization problems that minimize the accuracy of ML models by perturbing inputs, often using a model's loss function to craft such perturbations.
Cilloni, Thomas +2 more
openaire +2 more sources
ACM MM2022 Brave New ...
Sang, Jitao +3 more
openaire +2 more sources

