Results 41 to 50 of about 85,609 (269)
MAT: A Multi-strength Adversarial Training Method to Mitigate Adversarial Attacks
Some recent works revealed that deep neural networks (DNNs) are vulnerable to so-called adversarial attacks where input examples are intentionally perturbed to fool DNNs.
Chen, Yiran +7 more
core +1 more source
Real-Time Adversarial Attacks [PDF]
In recent years, many efforts have demonstrated that modern machine learning algorithms are vulnerable to adversarial attacks, where small, but carefully crafted, perturbations on the input can make them fail. While these attack methods are very effective, they only focus on scenarios where the target model takes static input, i.e., an attacker can ...
Yuan Gong 0001 +3 more
openaire +2 more sources
Exploring the Impact of Conceptual Bottlenecks on Adversarial Robustness of Deep Neural Networks
Deep neural networks (DNNs), while powerful, often suffer from a lack of interpretability and vulnerability to adversarial attacks. Concept bottleneck models (CBMs), which incorporate intermediate high-level concepts into the model architecture, promise ...
Bader Rasheed +4 more
doaj +1 more source
Adversarial attacks on deep learning models in smart grids
A smart grid may employ various machine learning models for intelligent tasks, such as load forecasting, fault diagnosis and demand response. However, the research on adversarial machine learning has attracted broad interest recently with the rapid ...
Jingbo Hao, Yang Tao
doaj +1 more source
Fooling Vision and Language Models Despite Localization and Attention Mechanism
Adversarial attacks are known to succeed on classifiers, but it has been an open question whether more complex vision systems are vulnerable. In this paper, we study adversarial examples for vision and language models, which incorporate natural language ...
Chen, Xinyun +5 more
core +1 more source
Adversarial Training for Free!
Adversarial training, in which a network is trained on adversarial examples, is one of the few defenses against adversarial attacks that withstands strong attacks.
Davis, Larry S. +8 more
core +1 more source
A Survey on Adversarial Attacks for Malware Analysis
Machine learning-based malware analysis approaches are widely researched and deployed in critical infrastructures for detecting and classifying evasive and growing malware threats.
Kshitiz Aryal +4 more
doaj +1 more source
While Machine Learning has become the holy grail of modern-day computing, it has many security flaws that have yet to be addressed and resolved. Adversarial attacks are one of these security flaws, in which an attacker appends noise to data samples that ...
Hiskias Dingeto, Juntae Kim
doaj +1 more source
All‐Optical Reconfigurable Physical Unclonable Function for Sustainable Security
An all‐optical reconfigurable physical unclonable function (PUF) is demonstrated using plasmonic coupling–induced sintering of optically trapped gold nanoparticles, where Brownian motion serves as a robust entropy source. The resulting optical PUF exhibits high encoding density, strong resistance to modeling attacks, and practical authentication ...
Jang‐Kyun Kwak +4 more
wiley +1 more source
Learnable Diffusion Framework for Mouse V1 Neural Decoding
We introduce Sensorium‐Viz, a diffusion‐based framework for reconstructing high‐fidelity visual stimuli from mouse primary visual cortex activity. By integrating a novel spatial embedding module with a Diffusion Transformer (DiT) and a synthetic‐response augmentation strategy, our model outperforms state‐of‐the‐art fMRI‐based baselines, enabling robust
Kaiwen Deng +2 more
wiley +1 more source

