Results 21 to 30 of about 243,531 (318)

Adversarial Attack and Defense on Deep Neural Network-Based Voice Processing Systems: An Overview

open access: yesApplied Sciences, 2021
Voice Processing Systems (VPSes), now widely deployed, have become deeply involved in people’s daily lives, helping drive the car, unlock the smartphone, make online purchases, etc.
Xiaojiao Chen, Sheng Li, Hao Huang
doaj   +1 more source

Minimum Adversarial Examples

open access: yesEntropy, 2022
Deep neural networks in the area of information security are facing a severe threat from adversarial examples (AEs). Existing methods of AE generation use two optimization models: (1) taking the successful attack as the objective function and limiting perturbations as the constraint; (2) taking the minimum of adversarial perturbations as the target and
Zhenyu Du, Fangzheng Liu, Xuehu Yan
openaire   +3 more sources

Targeted Speech Adversarial Example Generation With Generative Adversarial Network

open access: yesIEEE Access, 2020
Although neural network-based speech recognition models have enjoyed significant success in many acoustic systems, they are susceptible to be attacked by the adversarial examples.
Donghua Wang   +4 more
doaj   +1 more source

Adversarial Example Games

open access: yesCoRR, 2020
Appears in: Advances in Neural Information Processing Systems 33 (NeurIPS 2020)
Avishek Joey Bose   +6 more
openaire   +3 more sources

Perceptually Similar Image Classification Adversarial Example Generation Model

open access: yesJisuanji kexue yu tansuo, 2020
The existing generator-based adversarial example generation model can effectively reduce the construction time of an adversarial example compared to the algorithms based on iterative original image modification, but the obvious differences between ...
LI Junjie, WANG Qian
doaj   +1 more source

Adversarial Examples for Good: Adversarial Examples Guided Imbalanced Learning

open access: yes2022 IEEE International Conference on Image Processing (ICIP), 2022
Appeared in ICIP ...
Jie Zhang 0081   +3 more
openaire   +2 more sources

Generating Adversarial Examples with Adversarial Networks [PDF]

open access: yesProceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
Deep neural networks (DNNs) have been found to be vulnerable to adversarial examples resulting from adding small-magnitude perturbations to inputs. Such adversarial examples can mislead DNNs to produce adversary-selected results. Different attack strategies have been proposed to generate adversarial examples, but how to produce them with high ...
Chaowei Xiao   +5 more
openaire   +2 more sources

A Hybrid Adversarial Attack for Different Application Scenarios

open access: yesApplied Sciences, 2020
Adversarial attack against natural language has been a hot topic in the field of artificial intelligence security in recent years. It is mainly to study the methods and implementation of generating adversarial examples. The purpose is to better deal with
Xiaohu Du   +6 more
doaj   +1 more source

Dual-Targeted Textfooler Attack on Text Classification Systems

open access: yesIEEE Access, 2023
Deep neural networks provide good performance on classification tasks such as those for image, audio, and text classification. However, such neural networks are vulnerable to adversarial examples.
Hyun Kwon
doaj   +1 more source

A Two-Stage Generative Adversarial Networks With Semantic Content Constraints for Adversarial Example Generation

open access: yesIEEE Access, 2020
Deep neural networks (DNNs) have achieved great success in various applications due to their strong expressive power. However, recent studies have shown that DNNs are vulnerable to adversarial examples, and these manipulated instances can mislead DNN ...
Jianyi Liu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy