Results 41 to 50 of about 85,609 (269)

MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks

open access: yes, 2018
Some recent works revealed that deep neural networks (DNNs) are vulnerable to so-called adversarial attacks where input examples are intentionally perturbed to fool DNNs.
Chen, Yiran   +7 more
core   +1 more source

Real-Time Adversarial Attacks [PDF]

open access: yesProceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
In recent years, many efforts have demonstrated that modern machine learning algorithms are vulnerable to adversarial attacks, where small, but carefully crafted, perturbations on the input can make them fail. While these attack methods are very effective, they only focus on scenarios where the target model takes static input, i.e., an attacker can ...
Yuan Gong 0001   +3 more
openaire   +2 more sources

Exploring the Impact of Conceptual Bottlenecks on Adversarial Robustness of Deep Neural Networks

open access: yesIEEE Access
Deep neural networks (DNNs), while powerful, often suffer from a lack of interpretability and vulnerability to adversarial attacks. Concept bottleneck models (CBMs), which incorporate intermediate high-level concepts into the model architecture, promise ...
Bader Rasheed   +4 more
doaj   +1 more source

Adversarial attacks on deep learning models in smart grids

open access: yesEnergy Reports, 2022
A smart grid may employ various machine learning models for intelligent tasks, such as load forecasting, fault diagnosis and demand response. However, the research on adversarial machine learning has attracted broad interest recently with the rapid ...
Jingbo Hao, Yang Tao
doaj   +1 more source

Fooling Vision and Language Models Despite Localization and Attention Mechanism

open access: yes, 2018
Adversarial attacks are known to succeed on classifiers, but it has been an open question whether more complex vision systems are vulnerable. In this paper, we study adversarial examples for vision and language models, which incorporate natural language ...
Chen, Xinyun   +5 more
core   +1 more source

Adversarial Training for Free!

open access: yes, 2019
Adversarial training, in which a network is trained on adversarial examples, is one of the few defenses against adversarial attacks that withstands strong attacks.
Davis, Larry S.   +8 more
core   +1 more source

A Survey on Adversarial Attacks for Malware Analysis

open access: yesIEEE Access
Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats.
Kshitiz Aryal   +4 more
doaj   +1 more source

Universal Adversarial Training Using Auxiliary Conditional Generative Model-Based Adversarial Attack Generation

open access: yesApplied Sciences, 2023
While Machine Learning has become the holy grail of modern-day computing, it has many security flaws that have yet to be addressed and resolved. Adversarial attacks are one of these security flaws, in which an attacker appends noise to data samples that ...
Hiskias Dingeto, Juntae Kim
doaj   +1 more source

All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security

open access: yesAdvanced Materials, EarlyView.
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak   +4 more
wiley   +1 more source

Learnable Diffusion Framework for Mouse V1 Neural Decoding

open access: yesAdvanced Science, EarlyView.
We introduce Sensorium‐Viz, a diffusion‐based framework for reconstructing high‐fidelity visual stimuli from mouse primary visual cortex activity. By integrating a novel spatial embedding module with a Diffusion Transformer (DiT) and a synthetic‐response augmentation strategy, our model outperforms state‐of‐the‐art fMRI‐based baselines, enabling robust
Kaiwen Deng   +2 more
wiley   +1 more source

Home - About - Disclaimer - Privacy