Results 21 to 30 of about 82,924 (315)
Open-Set Adversarial Defense [PDF]
Accepted by ECCV ...
Rui Shao 0001 +3 more
openaire +2 more sources
Attacking Adversarial Attacks as A Defense
It is well known that adversarial attacks can fool deep neural networks with imperceptible perturbations. Although adversarial training significantly improves model robustness, failure cases of defense still broadly exist. In this work, we find that the adversarial attacks can also be vulnerable to small perturbations.
Boxi Wu +8 more
openaire +2 more sources
Adversarial Ranking Attack and Defense [PDF]
Deep Neural Network (DNN) classifiers are vulnerable to adversarial attack, where an imperceptible perturbation could result in misclassification. However, the vulnerability of DNN-based image ranking systems remains under-explored. In this paper, we propose two attacks against deep ranking systems, i.e., Candidate Attack and Query Attack, that can ...
Mo Zhou +4 more
openaire +2 more sources
Survey on adversarial attacks and defense of face forgery and detection
Face forgery and detection has become a research hotspot.Face forgery methods can produce fake face images and videos.Some malicious videos, often targeting celebrities, are widely circulated on social networks, damaging the reputation of victims and ...
Shiyu HUANG, Feng YE, Tianqiang HUANG, Wei LI, Liqing HUANG, Haifeng LUO
doaj +3 more sources
Robust Rumor Detection based on Multi-Defense Model Ensemble
The development of adversarial technology, represented by adversarial text, has brought new challenges to rumor detection based on deep learning. In order to improve the robustness of rumor detection models under adversarial conditions, we propose a ...
Fan Yang, Shaomei Li
doaj +1 more source
Adversarial Attacks Defense Method Based on Multiple Filtering and Image Rotation
Adversarial examples in an image classification task cause neural networks to predict incorrect class labels with high confidence. Many applications related to image classification, such as self-driving and facial recognition, have been seriously ...
Feng Li, Xuehui Du, Liu Zhang
doaj +1 more source
The vulnerability of Deep Neural Networks (DNNs) to adversarial examples has been confirmed. Existing adversarial defenses primarily aim at preventing adversarial examples from attacking DNNs successfully, rather than preventing their generation. If the generation of adversarial examples is unregulated, images within reach are no longer secure and pose
Jinwei Wang +5 more
openaire +2 more sources
Textual Adversarial Training Method Based on Distributed Perturbation [PDF]
Text adversarial defense aims to enhance the resilience of neural network models against different adversarial attacks. The current text confrontation defense methods are usually only effective against certain specific confrontation attacks and have ...
Zhidong SHEN, Hengxian YUE
doaj +1 more source
The Defense of Adversarial Example with Conditional Generative Adversarial Networks [PDF]
Deep neural network approaches have made remarkable progress in many machine learning tasks. However, the latest research indicates that they are vulnerable to adversarial perturbations. An adversary can easily mislead the network models by adding well-designed perturbations to the input. The cause of the adversarial examples is unclear.
Fangchao Yu +3 more
openaire +1 more source
Adversarial attack and defense on graph neural networks: a survey
For the numerous existing adversarial attack and defense methods on GNN, the main adversarial attack and defense algorithms of GNN were reviewed comprehensively, as well as robustness analysis techniques.Besides, the commonly used benchmark datasets and ...
Jinyin CHEN +4 more
doaj +3 more sources

