Certified Defenses against Adversarial Examples
While neural networks have achieved high accuracy on standard image classification benchmarks, their accuracy drops to nearly zero in the presence of small adversarial perturbations to test inputs. Defenses based on regularization and adversarial training have been proposed, but often followed by new, stronger attacks that defeat these defenses. Can we
Raghunathan, Aditi +2 more
openaire +2 more sources
The exploration and implementation of brain-computer interfaces (BCIs) utilizing electro- encephalography (EEG) are becoming increasingly widespread. However, their safety considerations have received scant attention.
Yongting Ding, Lin Li, Qingyan Li
doaj +1 more source
Traffic adversarial example attack and defense method based on explainable artificial intelligence
An adversarial example attack method based on XAI was proposed for AI-based NIDS. By identifying critical perturbation features with XAI and applying targeted perturbations while preserving traffic functionality, malicious traffic was gradually altered ...
MA Bowen +4 more
doaj
Image classification models have been widely applied to facilitate functions such as autonomous perception and positioning for automated driving in many transportation systems, including automobiles, autonomous rail and urban rail transit systems ...
TANG Jun +3 more
doaj
Adversarial Defense without <i>Adversarial Defense</i>: Enhancing Language Model Robustness via Instance-level Principal Component Removal. [PDF]
Wang Y +5 more
europepmc +1 more source
An Integrated and Robust Vision System for Internal and External Thread Defect Detection with Adversarial Defense. [PDF]
Fu L, Li L, Zhang G, Jiang Z.
europepmc +1 more source
Random heterogeneous spiking neural network for adversarial defense. [PDF]
Wang J +5 more
europepmc +1 more source
Adversarial robust EEG-based brain-computer interfaces using a hierarchical convolutional neural network. [PDF]
Samuel J +5 more
europepmc +1 more source
STS-AT: A Structured Tensor Flow Adversarial Training Framework for Robust Intrusion Detection. [PDF]
Zhu J, Chen Z, Cong R, Sun H, Dong Y.
europepmc +1 more source
Privacy-preserving cyberthreat detection in decentralized social media with federated cross-modal graph transformers. [PDF]
Premkumar D, Nachimuthu SK.
europepmc +1 more source

