Results 261 to 270 of about 5,561,446 (302)
Some of the next articles are maybe not open access.

AdvDiffuser: Natural Adversarial Example Synthesis with Diffusion Models

IEEE International Conference on Computer Vision, 2023
Previous work on adversarial examples typically involves a fixed norm perturbation budget, which fails to capture the way humans perceive perturbations.
Xinquan Chen   +4 more
semanticscholar   +1 more source

Joint Adversarial Example and False Data Injection Attacks for State Estimation in Power Systems

IEEE Transactions on Cybernetics, 2021
Although state estimation using a bad data detector (BDD) is a key procedure employed in power systems, the detector is vulnerable to false data injection attacks (FDIAs).
Jiwei Tian   +5 more
semanticscholar   +1 more source

MANDA: On Adversarial Example Detection for Network Intrusion Detection System

IEEE Conference on Computer Communications, 2021
With the rapid advancement in machine learning (ML), ML-based Intrusion Detection Systems (IDSs) are widely deployed to protect networks from various attacks.
Ning Wang   +4 more
semanticscholar   +1 more source

Adversarial example detection for DNN models: a review and experimental comparison

Artificial Intelligence Review, 2021
Deep learning (DL) has shown great success in many human-related tasks, which has led to its adoption in many computer vision based applications, such as security surveillance systems, autonomous vehicles and healthcare. Such safety-critical applications
Ahmed Aldahdooh   +3 more
semanticscholar   +1 more source

Adversarial Example Detection Using Latent Neighborhood Graph

IEEE International Conference on Computer Vision, 2021
Detection of adversarial examples with high accuracy is critical for the security of deployed deep neural network-based models. We present the first graph-based adversarial detection method that constructs a Latent Neighborhood Graph (LNG) around an ...
Ahmed A. Abusnaina   +6 more
semanticscholar   +1 more source

Robust Android Malware Detection against Adversarial Example Attacks

The Web Conference, 2021
Adversarial examples pose severe threats to Android malware detection because they can render the machine learning based detection systems useless. How to effectively detect Android malware under various adversarial example attacks becomes an essential ...
Heng Li   +5 more
semanticscholar   +1 more source

Towards Multiple Black-boxes Attack via Adversarial Example Generation Network

ACM Multimedia, 2021
The current research on adversarial attacks aims at a single model while the research on attacking multiple models simultaneously is still challenging.
Mingxing Duan   +4 more
semanticscholar   +1 more source

SmsNet: A New Deep Convolutional Neural Network Model for Adversarial Example Detection

IEEE transactions on multimedia, 2021
The emergence of adversarial examples has had a significant impact on the development and application of deep learning. In this paper, a novel convolutional neural network model, the stochastic multifilter statistical network (SmsNet), is proposed for ...
Jinwei Wang   +6 more
semanticscholar   +1 more source

Adversarial-Example Attacks Toward Android Malware Detection System

IEEE Systems Journal, 2020
Recently, it was shown that the generative adversarial network (GAN) based adversarial-example attacks could thoroughly defeat the existing Android malware detection systems.
Heng Li   +4 more
semanticscholar   +1 more source

Selective Audio Adversarial Example in Evasion Attack on Speech Recognition System

IEEE Transactions on Information Forensics and Security, 2020
Deep neural networks (DNNs) are widely used for image recognition, speech recognition, and other pattern analysis tasks. Despite the success of DNNs, these systems can be exploited by what is termed adversarial examples.
Hyun Kwon, Hyun Kwon, H. Yoon, D. Choi
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy