Results 21 to 30 of about 243,531 (318)
Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview
Voice Processing Systems (VPSes), now widely deployed, have become deeply involved in people’s daily lives, helping drive the car, unlock the smartphone, make online purchases, etc.
Xiaojiao Chen, Sheng Li, Hao Huang
doaj +1 more source
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: (1) taking the successful attack as the objective function and limiting perturbations as the constraint; (2) taking the minimum of adversarial perturbations as the target and
Zhenyu Du, Fangzheng Liu, Xuehu Yan
openaire +3 more sources
Targeted Speech Adversarial Example Generation With Generative Adversarial Network
Although neural network-based speech recognition models have enjoyed significant success in many acoustic systems, they are susceptible to be attacked by the adversarial examples.
Donghua Wang +4 more
doaj +1 more source
Appears in: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)
Avishek Joey Bose +6 more
openaire +3 more sources
Perceptually Similar Image Classification Adversarial Example Generation Model
The existing generator-based adversarial example generation model can effectively reduce the construction time of an adversarial example compared to the algorithms based on iterative original image modification, but the obvious differences between ...
LI Junjie, WANG Qian
doaj +1 more source
Adversarial Examples for Good: Adversarial Examples Guided Imbalanced Learning
Appeared in ICIP ...
Jie Zhang 0081 +3 more
openaire +2 more sources
Generating Adversarial Examples with Adversarial Networks [PDF]
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples resulting from adding small-magnitude perturbations to inputs. Such adversarial examples can mislead DNNs to produce adversary-selected results. Different attack strategies have been proposed to generate adversarial examples, but how to produce them with high ...
Chaowei Xiao +5 more
openaire +2 more sources
A Hybrid Adversarial Attack for Different Application Scenarios
Adversarial attack against natural language has been a hot topic in the field of artificial intelligence security in recent years. It is mainly to study the methods and implementation of generating adversarial examples. The purpose is to better deal with
Xiaohu Du +6 more
doaj +1 more source
Dual-Targeted Textfooler Attack on Text Classification Systems
Deep neural networks provide good performance on classification tasks such as those for image, audio, and text classification. However, such neural networks are vulnerable to adversarial examples.
Hyun Kwon
doaj +1 more source
Deep neural networks (DNNs) have achieved great success in various applications due to their strong expressive power. However, recent studies have shown that DNNs are vulnerable to adversarial examples, and these manipulated instances can mislead DNN ...
Jianyi Liu +4 more
doaj +1 more source

