Results 291 to 300 of about 243,531 (318)
How online studies must increase their defences against AI. [PDF]
Anders G, Buder J, Papenmeier F, Huff M.
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Learning Universal Adversarial Perturbation by Adversarial Example
Proceedings of the AAAI Conference on Artificial Intelligence, 2022Deep learning models have shown to be susceptible to universal adversarial perturbation (UAP), which has aroused wide concerns in the community. Compared with the conventional adversarial attacks that generate adversarial samples at the instance level, UAP can fool the target model for different instances with only a single perturbation, enabling us to
Maosen Li +4 more
openaire +1 more source
On The Generation of Unrestricted Adversarial Examples
2020 50th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W), 2020Adversarial examples are inputs designed by an adversary with the goal of fooling the machine learning models. Most of the research about adversarial examples have focused on perturbing the natural inputs with the assumption that the true label remains unchanged.
Mehrgan Khoshpasand +1 more
openaire +1 more source
On the Salience of Adversarial Examples
2019Adversarial examples are beginning to evolve as rapidly as the deep learning models they are designed to attack. These intentionally-manipulated inputs attempt to mislead the targeted model while maintaining the appearance of innocuous input data. Countermeasures against these attacks that take a global approach tend to be lossy to the original data ...
openaire +1 more source
Adversarial Examples for Malware Detection
2017Machine learning models are known to lack robustness against inputs crafted by an adversary. Such adversarial examples can, for instance, be derived from regular inputs by introducing minor—yet carefully selected—perturbations.
Kathrin Grosse +4 more
openaire +1 more source
Advops: Decoupling Adversarial Examples
Pattern Recognition, 2023Donghua Wang +3 more
openaire +1 more source
Unauthorized AI cannot recognize me: Reversible adversarial example
Pattern Recognition, 2023Weiming Zhang +2 more
exaly
Interpreting Universal Adversarial Example Attacks on Image Classification Models
IEEE Transactions on Dependable and Secure Computing, 2023Yi Ding, Fuyuan Tan, Ji Geng
exaly

